Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Hi I want ansewr this Q,pleas 1. Which of the following TCP/IP protocols do not

ID: 3729928 • Letter: H

Question


Hi

I want ansewr this Q,pleas

1. Which of the following TCP/IP protocols do not relate to security?

a. IP

b. SNMP

c. HTTPS

d. FT

2. Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

a. It is fully supported in BIND9.

b. It adds additional resource records.

c. It adds message header information.

d. It can prevent a DNS transfer attack.

3. What is the recommended secure protocol for voice and video applications?

a. Secure Real-time Transport Protocol (SRTP)

b. Hypertext Transport Protocol Secure (HTTPS)

c. Network Time Protocol (NTP)

d. Secure/Multipurpose Internet Mail Extensions (S/MIME)

4. Which type of log can provide details regarding requests for specific files on a system?

a. Audit log

b. Event log

c. Access log

d. SysFile log

5. Which type of device log contains the most beneficial security data?

a. Firewall log

b. Email log

c. Switch log

d. Router lo

6. Which type of cloud is offered to specific organizations that have common concerns?

a. Public cloud

b. Hybrid cloud

c. Private cloud

d. Community cloud

7. Which of these is NOT correct about an SSL accelerator?

a. It can be a separate hardware card that inserts into a web server.

b. It can be a separate hardware module.

c. It should reside between the user’s device and the web servers.

d. It can only handle the SSL protocol

Explanation / Answer

ANSWER:===>>>

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote