Multiple Choice
MATCHING
-a component of asymmetric encryption
A) spoofing
B) adware
C) steganography
D) spyware
E) port scan
F) port
G) hacker
H) necessity
I) authentication
J) secrecy
K) secret key
L) password manager
Correct Answer:

Verified
Correct Answer:
Verified
Q23: A digital ID is purchased from _.<br>A)
Q24: The latest, most secure form of SSL
Q25: The use of nonphysical security techniques to
Q26: A _ attack occurs when a cracker
Q27: MATCHING<br>-verifying the identity of a person<br>A)spoofing<br>B)adware<br>C)steganography<br>D)spyware<br>E)port scan<br>F)port<br>G)hacker<br>H)necessity<br>I)authentication<br>J)secrecy<br>K)secret
Q29: You can purchase a digital signature from
Q30: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TB5447/.jpg" alt=" -Figure 6-2 shows
Q31: A(n) _ attack involves phony email messages
Q32: A(n) _ is a small, hidden graphic
Q33: Firewalls can be used on Web _.<br>A)