星期日, 9月 26, 2010

Identifying Internet security measures

1. Which of the following involves users submitting their usernames and passwords in encrypted form?

Choose an option.

Anonymous access
Basic authentication
Secure authentication
Digital certificates


2. You use your ________ to decrypt messages you receive.

You send your _________ to the people from whom you expect to receive an encrypted message.

To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.

private key
public key


You use your private key to decrypt messages you receive.

You send your public key to the people from whom you expect to receive an encrypted message.


3. A digital certificate contains which of the following?

Choose more than one option.

A certificate serial number
A certificate expiration date
Your private key
The certificate authority's digital signature

沒有留言:

推薦此文