Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

4. Which of the following is a requirement for rooms housing network servers a.

ID: 2249810 • Letter: 4

Question

4. Which of the following is a requirement for rooms housing network servers a. Separate heating systems b. False ceilings c. Adequate cooling d. Shared electrical circuit 15. Which of the following is a good password a. 123456 b. Graham25 1. d. Thomas12 16. Which is of the following is a breach in a company's security protocol? Tom (network administrator) will only give access to the sensitive information on the database to those authorize to obtain access a. b. Susan will not give frank her access codes to a room containing highly classified data, even if Frank is authorize to work with the data Brian leaves his USERID and PASSWORD on his computer where everyone can see Laura notices that someone has access her computer without her permission, she promptly reports it to the IT department 2. c. d. 17. The resources users can access and the task they can perform on a network are referred to as which of the following a. Authentication b. Auditing c. Authorization d. Logon 18. If you want to prevent password guessing to foil intruders, you should enable which of the following? a. Account lockout b. Password expiration c. Password disabling d. Account policies 19. Firewalls can filter packets based on which of the following? a. Source address b. Protocol c. Operating system d. Context 20. When using encryption to protect transmitted data the receiver must have knowledge of the key to decrypt the encrypted data a. False b. True 21. A good security practice when transmitting encrypted data would be to transmit the decryption k with the encrypted data a. True b. False

Explanation / Answer

14.

Network servers are used for high processing of data or information. During this processing the servers will dessipate more heat. If this heat is not controlled the components in the system will get damaged or the system may hang. So sufficient cooling has to be provided inside the room.

Seperate heating systems will increases the heat in the room and severe the issue of system heating.

False ceiling helps in avoiding the leakage of cool air but not helps in suppressing the heat.

Shared electric circuit will not help to avoid heat generation.

Hence, adequate cooling is required.

15.

The password is said to be strong password when its length is of atleast 8 characters and have the combination of different elements like upper case letters, lower case letters, symbols, numbers etc. So that the permutation level of guessing the password and to decrypt it will be difficult for hackers. From the given choices G6a#bvP& is a good password because it follows all the above rules.

17.

For an user, to access and to perform a task on the network he must have the authority to do so.

Authentication is used to identify whether the person is a legible person or not. To authenticate the person password is used.

Auditing is for verifying.

Logon is the procedure of accessing the network.

Authorization is having the authority to do something. So, to access and to perform the task on a network one should need the authorization.

18.

The intruders can guess the password even it is disabled and in the time it gets expire. We can foil intruders to prevent password guessing by making the account locked for few minutes or reset by specified authenticated user after minimum guesses like 3 attempts or 4 attempts etc. This is called Account lockout.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote