A digital signature needs a________________
A digital signature needs a________________
SNMP is a framework for managing devices in an internet using the ____________
SNMP is a framework for managing devices in an internet using the ____________
Configuration management can be divided into two subsystems: reconfiguration and_______________
Configuration management can be divided into two subsystems: reconfiguration and_______________
Simple Network Management Protocol (SNMP), defines eight types of ___________
Simple Network Management Protocol (SNMP), defines eight types of ___________
Confidentiality with asymmetric-key cryptosystem has its own ______________
Confidentiality with asymmetric-key cryptosystem has its own ______________
In Message Confidentiality, the transmitted message must make sense to only intended_________________
In Message Confidentiality, the transmitted message must make sense to only intended_________________
A session symmetric key between two parties is used____________
A session symmetric key between two parties is used____________
The Performance management, is closely related to_________________
The Performance management, is closely related to_________________
One way to preserve the integrity of a document is through the use of a________________
One way to preserve the integrity of a document is through the use of a________________
The control of users, access to network resources through charges are the main responsibilities of _______________
The control of users, access to network resources through charges are the main responsibilities of _______________
To check the integrity of a message, or document, the receiver creates the ____________
To check the integrity of a message, or document, the receiver creates the ____________
Encryption and decryption provide secrecy, or confidentiality, but not____________
Encryption and decryption provide secrecy, or confidentiality, but not____________
MAC stands for _____________
MAC stands for _____________
Message authentication is a service beyond_______________
Message authentication is a service beyond_______________
BER stands for______________
BER stands for______________
A hash function guarantees the integrity of a message. It guarantees that the message has not be_____________
A hash function guarantees the integrity of a message. It guarantees that the message has not be_____________
SHA-l has a message digest of_____________
SHA-l has a message digest of_____________
Structure of Management Information (SMI), is the guideline of_______________
Structure of Management Information (SMI), is the guideline of_______________
Based on the predefined policy of Network management, controlling access to the network is the task of ________________
Based on the predefined policy of Network management, controlling access to the network is the task of ________________
A management station, called a manager, is a host that runs the______________
A management station, called a manager, is a host that runs the______________