The Performance management, is closely related to_________________
The Performance management, is closely related to_________________
BER stands for______________
BER stands for______________
Based on the predefined policy of Network management, controlling access to the network is the task of ________________
Based on the predefined policy of Network management, controlling access to the network is the task of ________________
Encryption and decryption provide secrecy, or confidentiality, but not____________
Encryption and decryption provide secrecy, or confidentiality, but not____________
MAC stands for _____________
MAC stands for _____________
SHA-l has a message digest of_____________
SHA-l has a message digest of_____________
A session symmetric key between two parties is used____________
A session symmetric key between two parties is used____________
One way to preserve the integrity of a document is through the use of a________________
One way to preserve the integrity of a document is through the use of a________________
A hash function guarantees the integrity of a message. It guarantees that the message has not be_____________
A hash function guarantees the integrity of a message. It guarantees that the message has not be_____________
SNMP is a framework for managing devices in an internet using the ____________
SNMP is a framework for managing devices in an internet using the ____________
Structure of Management Information (SMI), is the guideline of_______________
Structure of Management Information (SMI), is the guideline of_______________
Simple Network Management Protocol (SNMP), defines eight types of ___________
Simple Network Management Protocol (SNMP), defines eight types of ___________
Configuration management can be divided into two subsystems: reconfiguration and_______________
Configuration management can be divided into two subsystems: reconfiguration and_______________
Message authentication is a service beyond_______________
Message authentication is a service beyond_______________
A digital signature needs a________________
A digital signature needs a________________
To check the integrity of a message, or document, the receiver creates the ____________
To check the integrity of a message, or document, the receiver creates the ____________
In Message Confidentiality, the transmitted message must make sense to only intended_________________
In Message Confidentiality, the transmitted message must make sense to only intended_________________
A management station, called a manager, is a host that runs the______________
A management station, called a manager, is a host that runs the______________
Confidentiality with asymmetric-key cryptosystem has its own ______________
Confidentiality with asymmetric-key cryptosystem has its own ______________
The control of users, access to network resources through charges are the main responsibilities of _______________
The control of users, access to network resources through charges are the main responsibilities of _______________