Answer:
C. Address Resolution Protocol (ARP) poisoning.
Explanation:
An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.
A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.
When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.
Answer:
You should use the TACACS+, also known by the term "Terminal Access Controller Access Control System Plus".
Explanation:
This protocol provides users with comprehensive accounting information and an adaptable administrative control over processes like accounting, authorization, and authentication. Clients using the TACACS+ can ask for a comprehensive access control and TACACS+ would do the rest by responding to every of that request's components.
Answer:
length
Explanation:
<h2><u>Fill in the blanks </u></h2>
In a data dictionary, <u>length</u> is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.