Question 11
Which service in a PKI will vouch for the identity of an individual or company?
Question 12
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
Question 13
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Question 14
Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?
Question 15
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?