1
_____ is a way of hiding a message in plain sight (e.g. using invisible ink)
2
Session _____ is where an attacked on the Internet creates packets that look like they are from the real sender but actually intend to compromise the integrity of the crucial data
3
_____ key cryptography is when the encryption key is the same as the decryption key
4
_____ Encryption Standard (AES) is the modern heir to DES and supports 128-bit and larger keys
5
A Virtual Private Network (VPN) is where instead of encrypting all the data on a link, we only encrypt the data payload of each packet and leave the _____ in plain text
6
Some systems use the secret key to generate a _____ key which is used for a limited time
7
_____ key signatures are when only the sender can sign the message but anyone in the world can verify them
8
_____ DES (3DES) is a 112-bit upgraded version of DES
9
The Diffie-Hellman Key Exchange is vulnerable to a man in the _____ attack
10
A Certificate Authority, which may be a bank trusted by both the sender and the receiver, would give both parties a Bank _____ Certificate