Question
1. SFTP is a secure version of FTP. True False 2. You are the administrator of a large network. The network has several groups of
1. SFTP is a secure version of FTP.
- True
- False
2. You are the administrator of a large network. The network has several groups of users including students, administrators, developers, and front-end staff. Each user on the network is assigned network access depending on his or her job in the organization. Which access control method is being used?
- Discretionary access control
- Role-based access control
- Rule-based access control
- Mandatory access control
3. Discretionary access control uses an access control list to determine access.
- True
- False
4. As a network administrator, you are concerned with the cleartext transmission of sensitive data on the network. Which of the following protocols are used to help secure communications? (Select two.)
- FTPv2
- SCP
- SSL
- SNMP
5. As part of the network's overall security strategy, you want to establish an access control method in which the owner decides who can and who cannot access the information. Which type of access control method is being described?
- Mandatory access control
- Role-based access control
- Discretionary access control
- Rule-based access control.
- True
- False
8.
____,also known as Rijndael, is a block cipher encryption standard. It can create keys from 128 bits to 256 bits in length.
9. As a network administrator, you have configured your company's firewall to allow remote users access to the network only between the hours of 1:00 p.m. and 4:00 p.m. Which type of access control method is being used?
- Discretionary access control
- Role-based access control
- Mandatory access control
- Rule-based access control
10. You are concerned about the integrity of messages sent over your HTTP connection. You use HTTPS to secure the communication. Which of the following are hashing protocols used with SSL to provide security? (Select two.)
- IPSec
- SHAI
- MD5
- SFTP
11. A malicious user can insert
- True
- False
12. Authorization is any process by which you verify that someone is who they claim they are.
- True
- False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started