Site MapHelpFeedbackFill in the Blanks
Fill in the Blanks
(See related pages)

1

methods that allow you to determine if the original message has been changed in any way during transmission are referred to as hash functions.
2

A message or document created by a computer that has been by some trusted authority or third party is a digital certificate.
3

Authentication comes under the known as the Secure Socket Layer (SSL).
4

that monitors transmissions on a network and inspects the incoming information to see if it conforms to a set of guidelines established by the software or the organization owning the network is a firewall.
5

Antivirus is a commercial designed to be installed on a computer to find and eliminate security problems.
6

When software measures are used to block off segments of a network or create a subnetwork using software to assisgn access only to authorized users is referred to as a(n) LAN.
7

is the exchange of notes, letters, memos, and other personal communication by way of the Internet.
8

Access to websites on the Internet is made possible by way of a special piece of software known as a(n) .
9

VoIP is the technique of replacing standard telephone service with voice version with calls taking place over the Internet.
10

The host refers to a particular connected to the Internet.
11

A broadband connection is a(n) Internet connection provided by a local telephone company or some other organization.
12

A router is an intelligent computerlike device that looks at all packets transmitted to it and examines their Internet destination addresses.
13

On the Internet, each includes information about its source, destination, and the sequence of how it should be reassembled once it reaches its destination.
14

Multicasting is the ability of IP to move fast audio and video data over the Internet from a single source to destinations.
15

A smurf attack usually overwhelms ISP servers with a huge number of worthless , thereby preventing other ISP subscribers from using the system.







Frenzel Louis E.Online Learning Center

Home > Chapter 15 > Fill in the Blanks