100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary Computer Networks Assignment 3 Semester 1 2023

Puntuación
-
Vendido
-
Páginas
12
Subido en
23-06-2023
Escrito en
2022/2023

This module is an introduction to technologies, terminology, and skills used in the world of data networking. Emphasis is on practical applications of networking and computer technology to real-world problems. This module prepares students for entry-level jobs as a networking technician and prepares them for learning more advanced topics in networking.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
23 de junio de 2023
Número de páginas
12
Escrito en
2022/2023
Tipo
Resumen

Temas

Vista previa del contenido

COS2626




ASSIGNMENT 3 SEMESTER 1 2023




SOLUTIONS

,  Dashboard Calendar


Dashboard / My courses / COS2626-23-Y / Welcome to COS2626 / Assessment 3


Started on Friday, 23 June 2023, 5:29 PM
State Finished
Completed on Friday, 23 June 2023, 8:59 PM
Time taken 3 hours 29 mins
Grade 51.67 out of 60.00 (86%)


Question 1
Correct
1. Which one of the following is NOT a guideline of a security policy?
Mark 1.00 out of
1.00

a. Easy for users to understand and comply with.
b. Should be enforceable.
c. Uses legal terminology to protect the organization. 
d. Clearly states the policy objectives.



The correct answer is: Uses legal terminology to protect the organization.




Question 2
Correct
2. Which of the following questions must be answered before determining what level of security a network requires (More than one question applies)?
Mark 1.00 out of
1.00


a. What tools are used to attack the network?

b. What must be protected? 

c. From whom should data be protected? 

d. How much data is on the network?



The correct answers are: What must be protected?, From whom should data be protected?




Question 3

Partially correct
3. Which statements regarding authentication protocols are INCORRECT (More than one statement applies)?
Mark 0.67 out of
1.00


a. EAP (EAP) is a self-contained authentication protocol. 

b. MS-CHAP v2 (Microsoft Challenge Handshake Authentication Protocol version 2) is simple to crack and does not provide mutual authentication. 

c. RADIUS (Remote Authentication Dial-In User Service) centralizes AAAA (Authentication, Authorization, Accounting and Auditing).

d. TACACS+ is more secure than RADIUS because TACACS+ encrypts the entire package exchanged between client and server whereas RADIUS encrypts only the password.



The correct answers are: EAP (EAP) is a self-contained authentication protocol., MS-CHAP v2 (Microsoft Challenge Handshake Authentication Protocol version 2) is simple to crack and does not provide mutual authentication., RADIUS
(Remote Authentication Dial-In User Service) centralizes AAAA (Authentication, Authorization, Accounting and Auditing).




Question 4

Incorrect
4. If the MINIMUM password length on a Windows system is set to ZERO, what does this mean?
Mark 0.00 out of
1.00

a. The user never has to change the password.
b. The user can use a blank password.
c. The user must change the password every day. 
d. The user account is disabled.



The correct answer is: The user can use a blank password.




Question 5

Correct
5. The following diagram illustrates ________ authentication.
Mark 1.00 out of
1.00




a. dualfactor

b. multifactor 

c. personal

d. token-based



The correct answer is: multifactor





Question 6
Correct
6. IPSec, an extension to the IP (Internet Protocol) works by establishing an association between two communicating devices. An association is formed by two devices authenticating their identities by which methods (More than one
Mark 1.00 out of
method applies)?
1.00
$9.90
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Tkzee
4.0
(1)

Conoce al vendedor

Seller avatar
Tkzee University of South Africa (Unisa)
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
4
Miembro desde
7 año
Número de seguidores
2
Documentos
5
Última venta
2 año hace

4.0

1 reseñas

5
0
4
1
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes