1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
14

John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da

ta to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates.
What is this process called?
Computers and Technology
2 answers:
xeze [42]3 years ago
8 0

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

amid [387]3 years ago
5 0

Answer: Mutual authentication

Explanation:

Mutual authentication is also known as two-way authentication. It occurs when the process of authentication takes place between two parties in which they authenticate themselves, when these happens it means the client authenticate the server and the sever also authenticate the client. This helps to reduce the risk of online fraud.

You might be interested in
What are three things to consider in programming design?
Juli2301 [7.4K]

Answer: the problem being addressed, the goals of the project, and the programming language that will be used

Explanation:

7 0
3 years ago
The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
dangina [55]

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

4 0
4 years ago
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
Mention two hardware groups​
mars1129 [50]

Answer:

input Devices, Processing Devices, Output Devices, Memory/Storage Devices

Explanation:

4 0
3 years ago
What is output if month = 11 and day = 14?
goldfiish [28.3K]

Cheese

…………………………..tggggggcfcgvgvv

4 0
3 years ago
Read 2 more answers
Other questions:
  • Are sql injections legal?
    15·1 answer
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • A computer that stores and distributes newsgroup messages is called a newsreader.
    13·1 answer
  • ________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic the
    9·1 answer
  • You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office
    10·1 answer
  • Juan created new video game for his coding course. What is one way he can explain his code in everyday language?
    7·1 answer
  • Which model represents any process in general?
    6·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • How is an operating system like a translator?
    12·1 answer
  • A list cannot use appendleft but a _____ can.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!