Answer:
Causes of Stress
Being unhappy in your job.
Having a heavy workload or too much responsibility.
Working long hours.
Having poor management, unclear expectations of your work, or no say in the decision-making process.
Working under dangerous conditions.
Being insecure about your chance for advancement or risk of termination.
Answer:
B) TLS (Transport Layer Security)
Explanation:
SSL refers to secured socket layer, while TLS refers to Transport Layer Security. They are both security measures implementing crytography to ensure secured communication on a network especially in web and electronic mails. While very minor technical differences exist between these two protocols, SSL is veiwed as outdated because TLS uses stronger algorithms for encryption. The SSL is also unable to work on different ports unlike TLS.
Answer:
A. Device Administration
Explanation:
Terminal access controller access control system (TACACS) is an authentication protocol used for remote communication with any server housed in a UNIX network. TACACS provides an easy method of determining user network access via remote authentication server communication. The TACACS protocol uses port 49 by default.
TACACS uses allow/deny mechanisms with authentication keys that correspond with usernames and passwords. Cisco, which designed and launched the TACACS protocol, is also its owner.
Answer:
Symmetric, asymmetric and one-way hash cryptography.
Explanation:
Cryptography is a way of protecting data information and communication, using encryption keys and is only decrypted when it gets to the intended receiver.
There are three ways of which cryptography can be used to protect data. They are;
1. Symmetric cryptography
2. Asymmetric cryptography
3. One-way hash cryptography
Symmetric cryptography requires for one key to be used to encrypt and decrypt information. Asymmetric cryptography requires two keys, private and public keys that are mathematically related to encrypt and decrypt information. Both must be used together to encrypt and decrypt data.
One way hash uses an algorithm to convert a random length data to a fixed length encrypted data.