Match the mechanism with the policy it enforces

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Match the mechanism with the policy it enforces

12
Only vendor-authorized
programs may be used on
the system.
4. When the account number is
entered, the customer information
associated with that account will be
retrieved and displayed.
15
18
Customers of the store may
use the web to check their
accounts.
5. The login mechanism checks that
the password entered corresponds
to the user account entered.
1
Employees may not stream
videos during work hours.
Only users physically
present at the system can
6. Each program will be checked to
ensure it is approved for use by the
vendor before the program is run.
use it.
7. Networks have been disconnected
from the system.
Transcribed Image Text:12 Only vendor-authorized programs may be used on the system. 4. When the account number is entered, the customer information associated with that account will be retrieved and displayed. 15 18 Customers of the store may use the web to check their accounts. 5. The login mechanism checks that the password entered corresponds to the user account entered. 1 Employees may not stream videos during work hours. Only users physically present at the system can 6. Each program will be checked to ensure it is approved for use by the vendor before the program is run. use it. 7. Networks have been disconnected from the system.
Match the mechanism with the policy it enforces.
12
1. File protection mechanisms allow a
user to turn off read permission for
the group "students".
15
Users must pick passwords
that are hard to guess.
18
Student files will be
protected so other students
cannot read them.
2. The password changing program
requires all passwords to be at least
16 characters long, with at least 2
digits, 2 symbols (like "+" or "@"),
and both upper and lower case
letters.
21
Users must authenticate
themselves before using
the system.
The company blocks all streaming
video from entering its internal
network.
3.
Only vendor-authorized
programs may be used on
the system.
4. When the account number is
entered, the customer information
associated with that account will be
Transcribed Image Text:Match the mechanism with the policy it enforces. 12 1. File protection mechanisms allow a user to turn off read permission for the group "students". 15 Users must pick passwords that are hard to guess. 18 Student files will be protected so other students cannot read them. 2. The password changing program requires all passwords to be at least 16 characters long, with at least 2 digits, 2 symbols (like "+" or "@"), and both upper and lower case letters. 21 Users must authenticate themselves before using the system. The company blocks all streaming video from entering its internal network. 3. Only vendor-authorized programs may be used on the system. 4. When the account number is entered, the customer information associated with that account will be
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY