Front | Back |
Protects the confidentiality of data by making
the data unreadable to those who don’t have the correct key
|
Encryption
|
Most current encryption schemes are based on
|
Algorithms
|
The IPSec Security Association
is managed by:
|
ISAKMP
|
Types of cryptography that is
typically used to provide an integrity check
|
Hash
|
Message authentication
codes are used to provide what service?
|
Integrity
|
A user has a sensitive message
that need to be sent in via email. The message needs to be protected from
interception. What should be used when sending the email
|
Encryption
|
Refers to the ability to be
reasonably certain that data is not disclosed to unintended persons?
|
Confidentiality
|
Port 7
|
Echo
|
Port 19
|
Chargen
|
Port 20
|
FTP data
|
Port 21
|
FTP control
|
Port 22
|
SSH
|
Port 23
|
Telnet
|
Port 25
|
SMTP
|
Port 49
|
TACACS+
|