Security +

Security + review set.

49 cards   |   Total Attempts: 186
  

Cards In This Set

Front Back
Protects the confidentiality of data by making the data unreadable to those who don’t have the correct key
Encryption
Most current encryption schemes are based on
Algorithms
The IPSec Security Association is managed by:
ISAKMP
Types of cryptography that is typically used to provide an integrity check
Hash
Message authentication codes are used to provide what service?
Integrity
A user has a sensitive message that need to be sent in via email. The message needs to be protected from interception. What should be used when sending the email
Encryption
Refers to the ability to be reasonably certain that data is not disclosed to unintended persons?
Confidentiality
Port 7
Echo
Port 19
Chargen
Port 20
FTP data
Port 21
FTP control
Port 22
SSH
Port 23
Telnet
Port 25
SMTP
Port 49
TACACS+