What should an administrator look for when researching unencrypted channels on a network?

What will be an ideal response?


In general, look for the following insecure protocols and unencrypted channels:
•       Using Telnet instead of SSH for remote terminal connections.
•       Using HTTP instead of HTTPS on Web sites.
•       Using insecure remote desktops like VNC.
•       Using any insecure protocol in the clear. Run them through a VPN!
 

Computer Science & Information Technology

You might also like to view...

The ____________ element is used to create an HTML form.

a) form b) htmlForm c) h1 d) None of the above.

Computer Science & Information Technology

Given the method heading public static void strange(int a, int b)and the declarationint[] alpha = new int[20];int[] beta = new int[25];Which of the following is a valid call to the method strange?

A. strange(alpha[10], alpha[15]); B. strange(alpha[5], beta); C. strange(alpha[0], beta[25]); D. strange(alpha, beta[20]);

Computer Science & Information Technology

Syntax:

A) is a set of rules that govern the structure and components for a function. B) is an input such as a cell reference or a value needed to complete a function. C) is a small pop-up description that displays the arguments for a function as you enter it. D) displays a list of functions and defined names as you enter a function.

Computer Science & Information Technology

The two characters \ and ____, when used together, are called a newline escape sequence.

A. n B. e C. w D. x

Computer Science & Information Technology