John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices’ security certificates.
 
What type of security does the cloud-base service employ?

A. Mutual authentication
B. VPN
C. IMAP
D. Tethering


Answer: A

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 10-2Terrance had added a form to his blog to allow people to e-mail him feedback. He is having trouble getting his pages to validate and his JavaScript to work. The first thing Terrance should do is place his script in a(n) ____.

A. external file B. script tag C. body tag D. none of the above

Computer Science & Information Technology

Digits, letters and special symbols are referred to as_________ .

a) constants b) ints c) Strings d) characters

Computer Science & Information Technology

The Toggle Filter button is located in the ________ group

A) Reports B) Controls C) Sort & Filter D) Filter

Computer Science & Information Technology

Consider the following security measures for airline travel. A list of names of people who are not allowed to fly is maintained by the government and given to the airlines; people whose names are on the list are not allowed to make flight reservations. Before entering the departure area of the airport, passengers go through a security check where they have to present a government-issued ID and a

boarding pass. Before boarding a flight, passengers must present a boarding pass, which is scanned to verify the reservation. Show how some one who is on the no-fly list can manage to fly provided boarding passes can be printed online. Which additional security measures should be implemented in order to eliminate this vulnerability? What will be an ideal response?

Computer Science & Information Technology