Define PGP and SSH

1 Answer

Answer :

Pretty Good Privacy is used to provide security for electronic mail. It provides authentication,  confidentiality, data integrity, and non repudiation. A collection of public domain software that provides  privacy and authentication capabilities using RSA and that uses a mesh of trust for public key distribution.  
 Secure Shell is used to provide a remote login, and used to remotely execute commands and  transfer files and also provide strong client/server authentication / message integrity.

Related questions

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : How effective is brute forcing against SSH if someone is aware of your username? What security features are built in, and what should I do to increase security?

Last Answer : Very effective. My Mac OS X Servers have been cracked a couple times because of this. I've since closed port 22 to all traffic from outside our LAN. Legit users who need to access the server ... enforce secure password creation - like a min of 8 characters including at least 1 digit and 1 letter.

Description : Can a person rsyc using SSH from a remote location to a file server?

Last Answer : Are you trying to sync your local music to a remote server? You've built a mythtv box, kudos. That's not easy. (I'm calling the machine you ssh into your local machine) local -> file Then you ... file Is that correct? You're on the right track with the second command. Let me look up the syntax.

Description : What is the command line for copying from a Mac to iPhone via SSH Terminal?

Last Answer : Nevermind

Description : How to set up an SSH tunnel to a secure home network?

Last Answer : So what is at the other end, on your home net. You will need something running SSH on the other to decrypt the packets.

Description : If I'm using SVN+SSH, do I still need to leave the SVN port open on the server?

Last Answer : answer:The ssh port should be sufficient. You’re tunneling the svn through the ssh so having svn open is actually redundant. Here’s some proof to backup my statement.

Description : Just wondering on how the ssh provider earns if they are giving a month free ssh accounts?

Last Answer : They may earn less, or maybe even higher pay by the hour. And if it is remote based they may use a different computer as they may have 2 computers, or have different servers.

Description : PGP for OS X requires that SSL/TLS is disabled, does that mean that if it doesn't find a PGPKey for the recipient, my emails will be sent entirely unencrypted?

Last Answer : Don't you need the key to decrypt the message with PGP? SSL is a transmission privacy system, and PGP is a message privacy system If you encrypt with the public key, then only the private key ... would be able to decrypt the message. I don't think the message would be unencrypted, just unreadable

Description : Is there a way to add PGP to one's pc software?

Last Answer : Yes. Go to www.PGP.com and click on the store and buy it. or download the demo which has limited (but enough) functionality

Description : Where is Pretty good privacy (PGP) used ?

Last Answer : Pretty good privacy (PGP) is used in email security.

Description : What is the full form of PGP ?

Last Answer : PGP full form Pretty good privacy.

Description : Explain the use of PGP

Last Answer : PGP allows you to encrypt and decrypt a file by assigning a passphrase.

Description : For secure EDI transmission on internet a. MIME is used b. S/MIME is used c. PGP is used d. TCP/IP is used

Last Answer : b. S/MIME is used 

Description : In________framing, we need adelimiter (flag) to define the boundary of two frames. A) fixed-size B) variable-size C) standard D) none of the above

Last Answer : variable-size

Description : In IGMP, the general query message ___________________ group. A) doesnot define a particular B) explicitly defines a C) candefine more thanone D) noneof the above

Last Answer : doesnot define a particular

Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above

Last Answer : Database

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : The _______ domains define registered hosts according to their general behavior. A. generic B. country C. inverse D. none of the above

Last Answer : A. generic

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Define Gateway.

Last Answer : A device used to connect two separate networks that use different communication protocols.

Description : Define Congestion Control.

Last Answer : It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

Description : Define Subnetting

Last Answer : Subnetting provides an elegantly way to reduce the total number of network numbers that are assigned. It takes a single IP network number and allocate the IP address with that network to several physical networks, which are referred as subnets.

Description : Define Reliable flooding.

Last Answer : It is the process of making sure that all the nodes participating in the routing protocol get a copy of the link state information from all the other nodes.

Description : Define Routing. What is distance vector routing?

Last Answer : The process by which nodes exchange topological information to build correct forwarding tables. A lowest cost path algorithm used in routing. Each node advertises reachability information and associated costs ... , uses the updates it receives to construct its forwarding table. RIP uses it.

Description : Define ICMP.

Last Answer : Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully.

Description : Define flowcontrol. Mention the categories of it.

Last Answer : Flowcontrol refers to a set of procedures usedtorestrict the amount ofdata.Thesender cansenddata before waiting for acknowledgment.

Description : Define checksum. What are the steps followedinchecksumgenerator?

Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : Define topology and mention the types of topologies

Last Answer : Topology defines the physical or logical arrangement of links in a network. Types of topology : - Mesh - Star - Tree - Bus - Ring

Description : Define line configuration and give its types

Last Answer : It refers the way two or more communication devices attach to a link. A network consists of 2 or more computers directly connected by a physical medium. Types: i. Point to point – physical links are limited to a pair of nodes. ii. Multipoint – more than two nodes share a single physical link.