Advertisement
John Smith
Answered: Apr 20, 2024
Pptp -point-to-point tunneling protocol you can access a private network through the internet or other public network by using a virtual private network (vpn) connection with the point-to-point...Read More

1 Answer

267 views
John Smith
Answered: Apr 20, 2024
Replication mechanism, activation mechanism and objective. -replication mechanism: to replicate a virus needs to attach itself to the right code, where it can replicate and spread past security...Read More

1 Answer

266 views
John Smith
Answered: Apr 20, 2024
Investigate the e-mail as a possible hoax with a reputable anti-virus vendor. -if a virus threat is for real, the major anti-virus players like symantec, mcafee, or sophos will know about it before...Read More

1 Answer

265 views
John Smith
Answered: Apr 20, 2024
It represents something you have. Authentication is accomplished through something you know, something you have and/or something you are. One form of authentication requires possession of s...Read More

1 Answer

262 views
John Smith
Answered: Apr 20, 2024
Rule based access control-rule based access control is based on a specific profile for each user. information can be easily changed for only one user but this scheme may become a burden in a very...Read More

1 Answer

262 views
John Smith
Answered: Apr 20, 2024
External data supplied by the user. -common gateway interface is an older form of scripting that was used extensively in early web systems. cgi scripts could be used to capture data from a user...Read More

1 Answer

256 views
John Smith
Answered: Apr 20, 2024
Running a port scan against the target system. -a tcp/ip network makes many of the ports available to outside users through the router. these ports will respond in a predictable manner when queried....Read More

1 Answer

254 views
John Smith
Answered: Apr 20, 2024
Set-set (secure electronic transaction) is a system for ensuring the security of financial transactions on the internet. it was supported initially by mastercard, visa, microsoft, netscape, and...Read More

1 Answer

252 views
John Smith
Answered: Apr 20, 2024
Password must be easy to memorize.-passwords should be easy to memorize, because that minimizes the chance that users will write the password down somewhere that others could see it.passwords should...Read More

1 Answer

248 views
John Smith
Answered: Apr 20, 2024
Pptp-2. ipsec-a protocol or set of communication rules called point-to-point tunneling protocol (pptp) has been proposed that would make it possible to create a virtual private network (vpn) through...Read More

1 Answer

245 views
Wyatt Williams
Answered: Apr 20, 2024
Dictionary attack

A dictionary attack is an attack which uses a dictionary of common words to attempt to find the password of a user. Reference: Mike Pastore and Emmett Dulaney,...Read More

1 Answer

244 views
John Smith
Answered: Apr 20, 2024
Dacs (discretionary access control) -the dac model allows the owner of a resource to establish privileges to the information they own. the dac model would allow a user to share a file or use a file...Read More

1 Answer

239 views
John Smith
Answered: Apr 20, 2024
Use its digital certificate to establish its identity to the browser. -the secure socket layer is used to establish a secure communication connection between two tcp-based machines. this protocol...Read More

1 Answer

238 views
John Smith
Answered: Apr 20, 2024
Advantage is that it is easy to implement
Disadvantage is that it is not secure

Clear text authentication is very simple and easy to implement and verify. But a network that has...Read More

1 Answer

237 views
John Smith
Answered: Apr 20, 2024
Ssl (secure sockets layer) -the secure socket layer is used to establish a secure communication connection between two tcp-based machines. this protocol uses the handshake method. when a connection...Read More

1 Answer

236 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.