Match the mechanism with the policy it enforces
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
Match the

Transcribed Image Text:12
Only vendor-authorized
programs may be used on
the system.
4. When the account number is
entered, the customer information
associated with that account will be
retrieved and displayed.
15
18
Customers of the store may
use the web to check their
accounts.
5. The login mechanism checks that
the password entered corresponds
to the user account entered.
1
Employees may not stream
videos during work hours.
Only users physically
present at the system can
6. Each program will be checked to
ensure it is approved for use by the
vendor before the program is run.
use it.
7. Networks have been disconnected
from the system.

Transcribed Image Text:Match the mechanism with the policy it enforces.
12
1. File protection mechanisms allow a
user to turn off read permission for
the group "students".
15
Users must pick passwords
that are hard to guess.
18
Student files will be
protected so other students
cannot read them.
2. The password changing program
requires all passwords to be at least
16 characters long, with at least 2
digits, 2 symbols (like "+" or "@"),
and both upper and lower case
letters.
21
Users must authenticate
themselves before using
the system.
The company blocks all streaming
video from entering its internal
network.
3.
Only vendor-authorized
programs may be used on
the system.
4. When the account number is
entered, the customer information
associated with that account will be
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 2 images

Recommended textbooks for you

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education

Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY