Name four factors needed for a secure network.

1 Answer

Answer :

Privacy: The sender and the receiver expect confidentiality.  
Authentication: The receiver is sure of the sender’s identity and that an imposter has not sent the  message.  
Integrity: The data must arrive at the receiver exactly as it was sent.  
Non-Reputation: The receiver must able to prove that a received message came from a specific  sender.

Related questions

Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login

Last Answer : Secure socket layer

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729

Last Answer : 729

Description : Do you secure your wireless network?

Last Answer : Yup, of course.

Description : How to set up an SSH tunnel to a secure home network?

Last Answer : So what is at the other end, on your home net. You will need something running SSH on the other to decrypt the packets.

Description : Secure or insecure network?

Last Answer : answer:hmmm, well, it's a bit of both i guess, personally, when i still had windows i only had a router level firewall and that was all i needed, simply because i was a safe surfer. i think that' ... surfing behaviour. then again, i haven't dealt with virusses and such in 2 years and i'm glad for it

Description : I'm not angry complete novice. If I buy wifi for the computer, how do I ensure that the whole house is not connected? Will the password be set there or how is it solved?

Last Answer : Password, of course.

Description : How secure is a wireless network router, will my neighbors be able to use my connection?

Last Answer : Wireless networking can be very tightly secured, but with default settings the connection is easily stolen by neighbors with the appropriate knowledge.

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : What is a wireless network, and how do I make mine secure?

Last Answer : A wireless network (wi-fi) is a common way for computer users to access the Internet at home or work using radio waves rather than cables to transmit data. Leaving your network unlocked ... for the default password that comes from the manufacturer and ensure that you have a secure connection.

Description : For carrying out C2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... a. i and ii b. ii and iv c. i and iii d. i and iv

Last Answer : c. i and iii  

Description : For carrying out B2C e-Commerce the following infrastructure is essential  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v) Secure electronic communication link ... . i, iv b. i, iii, iv c. ii, iii d. i, ii, iii, iv

Last Answer : a. i, iv

Description : For carrying out B2B e-Commerce the following infrastructure is essential:  (i) World Wide Web  (ii) Corporate network  (iii) Electronic Data Interchange standards  (iv) Secure Payment Services  (v)Secure electronic communication link ... . ii, iii, iv c. ii, iii, iv, v d. i, ii, iii, iv, v

Last Answer : c. ii, iii, iv, v 

Description : how many address lines are needed to address each machine location in a 2048 x 4 memory chip? a. 10 b. 11 c. 8 d. 12

Last Answer : 11

Description : Latency time is a. Time to spin the needed data under head b. Time to spin the needed data under track c. Time to spin data under sector d. All of above

Last Answer : Time to spin the needed data under head

Description : What is the minimum number of wires needed to send data over a serial communication link layer? a. 1 b. 2 c. 4 d. 6 e. none of above

Last Answer : 2

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above

Last Answer : exactly 10

Description : Analog-to-analog conversionis needed if the available bandwidthis _______. A) low-pass B) band-pass C) either (a)or (b) D) neither (a) nor (b)

Last Answer : band-pass

Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)

Last Answer : (b) and (c)

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : ………………... are needed to communicate with systems on other networks. A. repeaters B. amplifiers C. Bridge D. Gateways

Last Answer : D. Gateways

Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above

Last Answer : B. High-level data link control

Description : How the TCP connections are needed in FTP?

Last Answer : FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred.

Description : Why is an application such as POP needed for electronic messaging?

Last Answer : Workstations interact with the SMTP host, which receives the mail on behalf of every host in the organization, to retrieve messages by using a client-server protocol such as Post Office Protocol, ... needed on the desktop to forward messages from the workstation user to its SMTP mail server.

Description : Why are protocols needed? What are the two interfaces provided by it?

Last Answer : A protocol is a set of rules that govern data communication. Provides communication service used to exchange messages. Service interface- defines operations that local objects can perform ... form and meaning of messages exchanged between protocol peers to implement the communication service.

Description : More secure authentication requires the use of at least? A. two-factor authentication. B. three-factor authentication. C. four-factor authentication. D. None of the above

Last Answer : two-factor authentication

Description : On which factors do the size of block depends in classless addressing? a. Nature & size of an entity b. Number of addresses c. Availability of the address space d. All of the above

Last Answer : a. Nature & size of an entity

Description : “The distribution pattern of the Railways network in the country has been largely influenced by physiographic factors” - Support the statement with four examples. -SST 10th

Last Answer : Physiographic factors regulate the distribution pattern of railways network. High mountains, broad rivers, dense forest, swampy land caused hindrance in the distribution pattern of railway networks in India.

Description : _______ model attempts to categorize a cloud network based on four dimensional factors. a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned

Last Answer : Cloud Cube

Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200

Last Answer : 255.255.255.0

Description : WAN stands for a. Wap Area Network b. Wide Area Network c. Wide Array Net d. Wireless Area Network

Last Answer : Wide Area Network

Description : Layer one of the OSI model is a. physical layer b. link layer c. transport layer d. network layer e. none of above

Last Answer : physical layer

Description : In OSI network architecture, the routing is performed by a. network layer b. data link layer c. transport layer d. session layer e. none of above

Last Answer : network layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : What is the term used todescribethe amount of space you have to transmit to and from the Internet? A) Internet speed B) Network speed C) Router D) Bandwidth

Last Answer : Bandwidth

Description : What type of network is commonly used in an international organization? A) WAN B) MAN C) LAN D) CAN

Last Answer : WAN

Description : What type of network is commonly used in a collegelab environment? A) WAN B) MAN C) LAN D) CAN

Last Answer : LAN

Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5

Last Answer : Router

Description : Which of the following is not describedas a typicalnetwork classification? A) Local areanetwork B) Wide area network C) Metropolitan areanetwork D) County area networ

Last Answer : County area network

Description : What interface card do you need toconnect to a network? A) ISP card B) Wireless card C) Router D) NIC

Last Answer : NIC