1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
3 years ago
14

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a

ssigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework
Computers and Technology
1 answer:
klasskru [66]3 years ago
3 0

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

You might be interested in
What is a key consideration when evaluating platforms?
kotegsom [21]

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

7 0
2 years ago
Technology and Communications Quiz Active 1 Which of the following inventions has had the greatest impact on sound technology? A
liraira [26]

Answer:

B the tape recorder bec half century later made sonorities not only reproducible but also alterable.

6 0
2 years ago
Create and code a program that uses three parallel numeric arrays of size 7. The program searches one of the arrays and then dis
Keith_Richards [23]

Answer:

Using C++, the  generated from the algorithm created in the explanation box is here by attached to this answer.

Explanation:  

To create the program, you need to analyse and design a solution before coding.  

Problem Analyses:

  • Input-The program requires the user to enter the part number to be searched and also a control number(sentinel) to allow user to continue searching. Therefor, 2 inputs are required.
  • Output-The program will display at least the part number entered, the corresponding price and quantity as the final output.
  • Process-The process that will convert the input to output will involve creating the 3 required array to store part numbers, price and quantity. There after, a search will be performed on the part number array to match and retrieve the corresponding price and quantity from their respective arrays.

Pseudo code

  • Initialize variables and the 3 arrays:run,value,i,partnum[],price[],quantity[],size
  • While run remains 'c'
  • Get value
  • Open for loop
  • If value is same as array index i
  • Print part number,price and quantity
  • Break from for loop
  • end if
  • Else if at the end of the search there is no value matching any part number
  • print not available      
  • Break
  • End esle if        
  • Update run                
  • End while
  • End program
Download pdf
5 0
3 years ago
Compare AES to DES. For each of the following elements of DES, indicate the comparable element in AES or explain why it is not n
Setler79 [48]

Answer:

See explaination for the comparison

Explanation:

Comparison Of AES & DES:

DES(Data Encryption Standard)

​In DES the data block is always been divided into two of the halves.

It works on the Feistel Cipher Structure.

The plaintext is of the 64 bits.

DES has 16 rounds in it.

The rounds that are in DES are as follows:

Expansion

Permutation

XOR

S-box

P-box

Swap

DES has a smaller key which is less secure as compared to AES

In speed, the DES is comparatively slower.

AES(Advanced Encryption Standard)

​In AES the entire data block is always processed as a single matrix.

It works on the principle of substitution and permutation.

The plaintext in AES varies from 128 bits ,192 bits, 256 bits, etc.

AES has a larger key size as compared to the DES.

There are many variations to the rounds in AES and is dependent on the bits of the encryption.They are as follows: 128-bits algorithm consists of 10 rounds. 192-bits algorithm consists of 12 rounds. 256-bits algorithm consists of 14 rounds.

The names for the rounds are as follows:

Subbytes

Shiftrows

Mix Columns

AddRoundkeys.

AES is having large secret key comapratively to the DES which is more secure.

Comparing the speed for the encryptions AES is faster than DES.

a.) AddRoundKey

b.) Since AES is not Feistel cipher this step is not essential.

c.) ByteSub is there.

d.) ShiftRow and MixColumn

e.) No swaping of halves

4 0
3 years ago
You are the network adminstrator for your company your network consists of two active directory domains research.westsim.local a
nexus9112 [7]

Answer:

We should configure the one of domain controller in the Houston to be the global catalog servers.

Explanation:

Configure the Domain controller:

1. Log in the MS Windows server host.

2. Then, click the Start Menu and goto the Tools, click on Manage Your Servers.  

  • on this wizard, you can choose the Adding Roles to your Servers.
  • in Server Role windows you can choose the Domain Controller.
  • Then, you can select the default values by the click on NEXT.
  • Then, continue accepts default values and click on the Next when the Report DNA Issues windows appears.
  • Then, select the Configure and install DNS for proceed to next window.
  • Then, continue to click on the Next when the Summary window will display then again click next.
  • After all, Active Directory Installation wizards are invoked.
5 0
2 years ago
Other questions:
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • 1.where should the name of the website or company logo appear on a website
    5·2 answers
  • Network connects computers to a single computer to share files, folders, and printers,
    5·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • What channel does the news come on? <br><br> i dont have cable i have roku :\
    8·1 answer
  • Cyberbullying can negatively impact a victim’s <br> well-being.
    13·1 answer
  • What is a cell address in xsl sheet
    14·1 answer
  • You can put ______ on your phone.
    10·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!