Create a checklist of steps you should take to secure your


Question 1

Which of these is one of the strongest cryptographic algorithms to break?

Advanced Encryption Standard (AES)
Symmetric Key Encryption
Public Key Encryption
Private Key Encryption

Question 2

For what reason would Local Area Networks (LAN's) NOT be more advantageous over other networks?

Enable people to work together
Shared networked hardware can reduce costs
Sharing data can increase productivity
Sharing a single copy of software across multiple computers

Question 3

A network device is defined as:

any electronic device that broadcasts network data, boosts signals, or routes data to its destination.
a Network Interface Card (NIC)
a node
a circuit

Question 4

Which Internet connection links your computer to an Internet Service Provider (ISP) from a stationary point?

Portable Internet Access
Mobile Internet Access
Fixed Internet Access
Symmetric Internet Access

Question 5

Which Internet protocol creates connections and exchanges packets of data?

User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)

Question 6

Create a checklist of steps you should take to secure your computer from Internet based intrusions, and discuss the steps in some detail.

Question 7

Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols?

Question 8

Identify two examples of synchronous and asynchronous communications that are offered on the Internet and briefly define synchronous and asynchronous communications.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Create a checklist of steps you should take to secure your
Reference No:- TGS01422534

Expected delivery within 24 Hours