1
_____ is a way of hiding a message in plain sight (e.g. using invisible ink)
2
_____ key cryptography is when the encryption key is the same as the decryption key
3
Session _____ is where an attacker on the Internet creates packets that look like they are from the real sender but actually intend to compromise the integrity of the crucial data
4
A Virtual Private Network (VPN) is where instead of encrypting all the data on a link, we only encrypt the data payload of each packet and leave the _____ in plain text
5
Some systems use the secret key to generate a _____ key which is used for a limited time
6
_____ key signatures are when only the sender can sign the message but anyone in the world can verify them
7
_____ Encryption Standard (AES) is the modern heir to DES and supports 128-bit and larger keys
8
The Diffie-Hellman Key Exchange is vulnerable to a man in the _____ attack
9
_____ DES (3DES) is a 112-bit upgraded version of DES
10
A Certificate Authority, which may be a bank trusted by both the sender and the receiver, would give both parties a Bank _____ Certificate