Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Assignment 14 1. A level of access to a resource, such as a folder or file, whic

ID: 3567687 • Letter: A

Question

Assignment 14

1. A level of access to a resource, such as a folder or file, which is a characteristic of the resource, not the user account.

2. A method of traffic filtering that not only uses addresses and port numbers, but also monitors the ongoing conversation by tracking sequence numbers, acknowledgements and connection status.

3. The most common public key (asymmetric) encryption standard.

4. A session layer protocol that encrypts data for upper-layer protocols, such as HTTP, FTP, and SMTP, to protect e-commerce transactions.

5. A server that acts as a go-between between the hosts inside the network and the Internet by substituting the host source address with its own.

6. The process of verifying the identity of users on the network.

7. A network attack characterized by sending more data to an application than expected, allowing the attacker to gain administrative access to the system.

8. A firewall architecture characterized by a server with two physical network interfaces, one connected to the inside network and one connected to the Internet and often used in conjunction with proxy software.

9. An AAA centralized authentication service that verifies client credentials and grants or denies network access.

10. A popular symmetric key encryption standard characterized by a 56-bit key.

11. A popular authentication and encryption security protocol designed specifically for IP traffic.

12. The concept of ensuring a system will continue to function even when faults occur by using redundant system components.

13. A hardware or software-based system that protects the inside network from the outside network by filtering the traffic between them.

14. A form of encryption which uses a key pair, one for encrypting and the other for decrypting the data.

15. The Window

Explanation / Answer

Yes They all seems correct.