Answer:
D. BGP
Explanation:
In order to exchange routing information with another AS (Autonomous Systems) only, exterior routers use an exterior routing protocol, like BGP (Border Gateway Protocol) or EGP (Exterior Routing Protocol).
BGP is an application-layer protocol in the TCP/IP suite, that uses a well-known TCP port (179) in order to deliver information reliably.
It is important to note that in order to exchange routing data within his own AS, the router uses an interior routing protocol, like OSPF.
Answer:
Explanation:
From the given information;
We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.
NOTE:
That the destination port numbers sent from A to S and B to S are the same in their segments.
That the destination port numbers sent from S to A and S to B are the same in their segments.
From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)
From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet).
From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.
From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.
Yes, it is possible. This is because the inclusion of IP in the segments is to recognize the host.
No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.
NSTISSI NO 4011 has become a widely accepted evaluation standard for training and education related to the security of information system. The standard is directed at information security professionals who are experts in identifying system vulnerabilities, investigating system security, documenting, analyzing and evaluating system security technology policies.<span />
Answer:
1. Control Activities
2. Internal
Explanation:
Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.
In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.
This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.