Problem

Match the following terms and definitions.a.dynamic password____1.A commercial disaster re...

Match the following terms and definitions.

a.

dynamic password

____

1.

A commercial disaster recovery service that provides a fully operational site within a few hours

b.

token device (TD)

____

2.

A hardware device that contains a password generator protocol

c.

single sign-on (SSO)

____

3.

A commercial disaster recovery service that provides a partially configured site that is operational within a few days

d.

Intrusion Prevention System (IPS)

____

4.

A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing but no IT equipment

e.

input controls

____

5.

A backup technique that keeps multiple backups

f.

output controls

____

6.

Backup services shared between two organizations

g.

Grandfather-Father-Son method

____

7.

Controls that ensure reports and messages reach intended recipients

h.

reciprocal agreement

____

8.

In asymmetric cryptography, the key used to decode the message

i.

internal sites

____

9.

Backup services distributed among an organization’s multiple locations

j.

hot sites

____

10.

Systems used to prevent access control attacks

k.

warm sites

____

11.

A software that permits the user to use one username and password to log in to various systems

l.

cold sites

____

12.

A cryptography key that substitutes one letter for another letter

m.

substitution key

____

13.

A cryptography key that scrambles the data

n.

transposition key

____

14.

A cryptography key that uses a combination of substitution and transposition keys

o.

product key

____

15.

Controls that ensure that data is valid and entered correctly

p.

symmetric cryptography (1-key method)

____

16.

Cryptography that uses one key to encode and a second key to decode

q.

asymmetric cryptography (2-key method)

____ ___

17.

A password used once and then changed

r.

digital envelope (3-key method)

____

18.

Cryptography that uses both symmetric and asymmetric cryptography

s.

public key

____

19.

Cryptography that uses the same key to encode and decode

t.

private key

____

20.

In asymmetric cryptography, the key used to encode the message

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search