Answer:
The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection
Answer:True
Explanation:Calling a Function.
A function is created by defining what that function needs to do. In order to utilize that function one has to do that task defined in that function. A called function is the one that carries on the defined task
Parameters need to be passed with the function name in order to call a function,the value returned by a function is then stored.
Answer:
Description: Write a MASM 32bit program with a loop and indexed addressing that calculates the sum of all thegaps between successive array elements. The array elements are doublewords, sequenced in nondecreasing order.
;Include Irvine32.inc file used with link library for 32 bit applications
.386
.model flat,stdcall
.stack 4096
ExitProcess proto,dwExitCode:dword
INCLUDE Irvine32.inc
.data
myArray DWORD 0,2,5,9,10
arrSize = ($-myArray)/TYPE myArray
gapArr DWORD arrSize-1 DUP(?)
sum DWORD ?
.code
main PROC
;Call the procedure
call Clrscr
;Initialize ESI pointer
mov esi, 0
mov ecx, arrSize
dec ecx
L1:
mov eax, myArray[esi+4]
sub eax, myArray[esi]
mov gapArr[esi], eax
inc esi
loop L1
;Calculate the sum of gaps between array elements
mov sum, 0
mov esi, 0
mov ecx, arrSize
dec ecx
; move gapArr[esi] to a temporary register and then add that register value to sum
L2:
mov edx, gapArr[esi]
add sum, edx
inc esi
loop L2
INVOKE ExitProcess,0
main ENDP
END main
Explanation:
Answer:
1. Option (a) is the correct answer. "Place a firewall between the Internet and your Web server".
2. Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".
3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".
4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".
5. Option (c) is the correct answer. "Enforce password complexity".
Explanation:
1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.
2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.
3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.
4.All personnel will be taught the network policies to avoid sending report to unsecured printers.
5. The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.