Questions
Now it's time to check your knowledge. Select the best response, then check your answers with those found in the Assessment section at the end of the book.
- In _____, Ray Tomlinson created electronic mail (email).
a. 1968
b. 1972
c. 1992
d. 1998
- When protecting data, _____ ensures that data is not modified, lost, or destroyed in either an accidental or unauthorized manner.
a. integrity
b. confidentiality
c. availability
d. authentication
- A digital _____ is a cryptographic technique using asymmetric encryption that ensures a message is authentic and has not been modified or altered while in transit.
a. breadcrumb
b. cookie
c. rail fence
d. signature
- When malicious actors often use an email address that spoofs the name to look like someone you know, this is a violation of _____.
a. integrity
b. confidentiality
c. availability
d. authentication
- _____ encryption uses a pair of keys: a public key and a private key.
a. Verified
b. Asymmetric
c. Symmetric
d. SHA-1
- _____ ciphers substitute each letter with a different letter according to the key.
a. Allocation
b. Substitution
c. Transposition
d. Pigpen
- The rail fence, or zig-zag, cipher is a _________ cipher that conceals data by using "rails" or separate lines of text.
a. allocation
b. substitution
c. transposition
d. pigpen