(TCO 4) Installing unauthorized hardware, such as a communication software and modem, _____.
(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.
(TCO 4) The ROT13 cipher is an example of a _____.
(TCO 4) Encrypting a message by simply rearranging the order of the letters is a function of the _____.
STATUS
(TCO 4) A special mathematical function that performs one-way encryption is called _____.
(TCO 4) The encryption method based on the idea of using a shared key for the encryption and decryption of data is _____.
(TCO 4) Why construct and implement a PKI?
(TCO 4) What is a certificate repository?
(TCO 4) What are the different fields within a digital certificate?
(TCO 4) A trust domain is defined as _____.