Answer:
See the table attached for complete solution to the problem.
Its use of the message digest 5 (MD5) hash algorithm for security.
CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.
Answer:
The characteristic that is violated is Availability.
Explanation:
- The network is passing data at mostly, it means performance is good. Junior network engineer is doing his job well then there is minimum chance of network failure or lack of manageability.
- The scalability; range of computing capabilties can be managed by the engineer.
- However, sometimes the core router might get crashed due to unavailability of the network that is not under the control of the engineer.
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Answer: c) a program.
Explanation:
A computer, is a hardware device, that differs from those with dedicated hardware (like a TV set, a radio, or an old phone) , in that it can be used for different purposes, due to it's a programmable device.
The way in which the computer is instructed to do anything, is by means of a set of instructions to be read and executed sequentially, which is called a program.
The set of the different programs stored in the computer is which is known as the computer software.