Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. SFTP is a secure version of FTP. True False 2. You are the administrator of a large network. The network has several groups of

1. SFTP is a secure version of FTP.

  1. True
  2. False

2. You are the administrator of a large network. The network has several groups of users including students, administrators, developers, and front-end staff. Each user on the network is assigned network access depending on his or her job in the organization. Which access control method is being used?

  1. Discretionary access control
  2. Role-based access control
  3. Rule-based access control
  4. Mandatory access control

3. Discretionary access control uses an access control list to determine access.

  1. True
  2. False

4. As a network administrator, you are concerned with the cleartext transmission of sensitive data on the network. Which of the following protocols are used to help secure communications? (Select two.)

  1. FTPv2
  2. SCP
  3. SSL
  4. SNMP

5. As part of the network's overall security strategy, you want to establish an access control method in which the owner decides who can and who cannot access the information. Which type of access control method is being described?

  1. Mandatory access control
  2. Role-based access control
  3. Discretionary access control
  4. Rule-based access control.
6.____ and Http are combined to secure online transactions
7. Mandatory access control secures information and resources by assigning sensitivity labels on objects and comparing this to the level of sensitivity a user is assigned.
  1. True
  2. False

8.

____,also known as Rijndael, is a block cipher encryption standard. It can create keys from 128 bits to 256 bits in length.

9. As a network administrator, you have configured your company's firewall to allow remote users access to the network only between the hours of 1:00 p.m. and 4:00 p.m. Which type of access control method is being used?

  1. Discretionary access control
  2. Role-based access control
  3. Mandatory access control
  4. Rule-based access control

10. You are concerned about the integrity of messages sent over your HTTP connection. You use HTTPS to secure the communication. Which of the following are hashing protocols used with SSL to provide security? (Select two.)

  1. IPSec
  2. SHAI
  3. MD5
  4. SFTP

11. A malicious user can insert

tags into your Web pages, creating interactive content designed to steal information from your users.

  1. True
  2. False

12. Authorization is any process by which you verify that someone is who they claim they are.

  1. True
  2. False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Generative Artificial Intelligence For Project Management With Aws

Authors: Timothy Krimmel

1st Edition

B0CQV9KWB8, 979-8872627197

More Books

Students also viewed these Databases questions