Match the following terms and definitions.
a. | dynamic password | ____ | 1. | A commercial disaster recovery service that provides a fully operational site within a few hours |
b. | token device (TD) | ____ | 2. | A hardware device that contains a password generator protocol |
c. | single sign-on (SSO) | ____ | 3. | A commercial disaster recovery service that provides a partially configured site that is operational within a few days |
d. | Intrusion Prevention System (IPS) | ____ | 4. | A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing but no IT equipment |
e. | input controls | ____ | 5. | A backup technique that keeps multiple backups |
f. | output controls | ____ | 6. | Backup services shared between two organizations |
g. | Grandfather-Father-Son method | ____ | 7. | Controls that ensure reports and messages reach intended recipients |
h. | reciprocal agreement | ____ | 8. | In asymmetric cryptography, the key used to decode the message |
i. | internal sites | ____ | 9. | Backup services distributed among an organization’s multiple locations |
j. | hot sites | ____ | 10. | Systems used to prevent access control attacks |
k. | warm sites | ____ | 11. | A software that permits the user to use one username and password to log in to various systems |
l. | cold sites | ____ | 12. | A cryptography key that substitutes one letter for another letter |
m. | substitution key | ____ | 13. | A cryptography key that scrambles the data |
n. | transposition key | ____ | 14. | A cryptography key that uses a combination of substitution and transposition keys |
o. | product key | ____ | 15. | Controls that ensure that data is valid and entered correctly |
p. | symmetric cryptography (1-key method) | ____ | 16. | Cryptography that uses one key to encode and a second key to decode |
q. | asymmetric cryptography (2-key method) | ____ ___ | 17. | A password used once and then changed |
r. | digital envelope (3-key method) | ____ | 18. | Cryptography that uses both symmetric and asymmetric cryptography |
s. | public key | ____ | 19. | Cryptography that uses the same key to encode and decode |
t. | private key | ____ | 20. | In asymmetric cryptography, the key used to encode the message |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.