What are the authentication considerations for network access regarding mobile devices?
What will be an ideal response?
When a user tries to use the device to access external resources, another authentication should be performed. This will prevent the most likely security issues such as spoofing, tampering, and unauthorized information disclosure. For Internet access, the device should support dial-up authentication, multiple networking and authentication protocols such as SSL, point-to-point protocol (PPP), wireless access protocol (WAP) and wireless transport layer security (WTLS). For corporate network access the device should support password authentication protocol (PAP), Challenge handshake authentication protocol (CHAP), and various virtual private network (VPN) protocols. It is a constant challenge for a mobile device to incorporate all of these needed components into a small system that is portable and still delivers high performance.
You might also like to view...
After you cut, _____.
A. the text is not removed from its original location and placed on the Clipboard B. the text is removed from its original location and placed on the Clipboard C. the text is removed from its original location and saved in the file D. the text is removed from its original location and placed on the desktop
COGNITIVE ASSESSMENT Which of the following statements best describes a BAN?
A. a network that covers a broad area B. a network type that is not allowed because of concerns about invasion of privacy C. a set of wearable or implanted body sensors that turns the body into a human router D. a device that uses Bluetooth technology to set up a network
Ethicists depend on what is called a ____ to try to make better and better ethical decisions.
A. categorical imperative B. dialectic C. reductionist argument D. deontology
What port numbers are used by FTP?
A. and 444 B. and 21 C. and 25 D. and 110