Question: 1. SFTP is a secure version of FTP. True False 2. You are the administrator of a large network. The network has several groups of

1. SFTP is a secure version of FTP.

  1. True
  2. False

2. You are the administrator of a large network. The network has several groups of users including students, administrators, developers, and front-end staff. Each user on the network is assigned network access depending on his or her job in the organization. Which access control method is being used?

  1. Discretionary access control
  2. Role-based access control
  3. Rule-based access control
  4. Mandatory access control

3. Discretionary access control uses an access control list to determine access.

  1. True
  2. False

4. As a network administrator, you are concerned with the cleartext transmission of sensitive data on the network. Which of the following protocols are used to help secure communications? (Select two.)

  1. FTPv2
  2. SCP
  3. SSL
  4. SNMP

5. As part of the network's overall security strategy, you want to establish an access control method in which the owner decides who can and who cannot access the information. Which type of access control method is being described?

  1. Mandatory access control
  2. Role-based access control
  3. Discretionary access control
  4. Rule-based access control.
6.____ and Http are combined to secure online transactions
7. Mandatory access control secures information and resources by assigning sensitivity labels on objects and comparing this to the level of sensitivity a user is assigned.
  1. True
  2. False

8.

____,also known as Rijndael, is a block cipher encryption standard. It can create keys from 128 bits to 256 bits in length.

9. As a network administrator, you have configured your company's firewall to allow remote users access to the network only between the hours of 1:00 p.m. and 4:00 p.m. Which type of access control method is being used?

  1. Discretionary access control
  2. Role-based access control
  3. Mandatory access control
  4. Rule-based access control

10. You are concerned about the integrity of messages sent over your HTTP connection. You use HTTPS to secure the communication. Which of the following are hashing protocols used with SSL to provide security? (Select two.)

  1. IPSec
  2. SHAI
  3. MD5
  4. SFTP

11. A malicious user can insert

tags into your Web pages, creating interactive content designed to steal information from your users.

  1. True
  2. False

12. Authorization is any process by which you verify that someone is who they claim they are.

  1. True
  2. False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!