Select ten key terms from chapter 6, ten key terms from chapter 7, ten key terms from chapter 8 and ten key terms from chapter 9 and type the definitions of each. Upload into canvas. chapter 6: Digital certificate • Dual control • End-entity certificate Hardware security module (HSM) • Hierarchical trust model • Hybrid trust model • Key archiving Key escrow • Key recovery • Local registration authority (LRA) chapter 7 Certificate Certificate Authority (CA) Certificate Revocation List (CRL) Internet Security Association and Key Management Protocol (ISAKMP) Key Terms • IPsec • Pretty Good Privacy (PGP) • Public key infrastructure (PKI) Secure/Multipurpose Internet Mail Extensions (S/MIME) chapter 8 Access tokens Autoplay Biometrics BIOS passwords Bootdisk • Contactless access cards Convergence Crossover error rate (CER) • Drive imaging chapter 9 Internet Control Message Protocol (ICMP) • Internet Protocol (IP) Intranet • Local area network (LAN Media Access Control (MAC) address • Network Address Translation (NAT) • Network • Packet • Protocol • Ring topology