Assume no FTP protocol exists. You are asked to define a function analogous to the FTP PUT for exchange of files. List three security features or mechanisms you would include in your protocol
What will be an ideal response?
(a)
End-?to-?end
error
detection
and
perhaps
correction.
(b)
On
the
receiving
end
control
of
where
file
is
placed.
(c)
On
the
receiving
end
control
of
acknowledgment
for
receipt
of
packets.
(d)
Ability
to
resume
transfer
of
a
failed
transmission
"in
the
middle."
(e)
Optional
end-?to-?end
encryption
for
very
sensitive
files.
You might also like to view...
Java programs communicate with databases using what API?
a. DBMS. b. JDBC. c. RDBMS. d. Database.
Answer the following statements true (T) or false (F)
1. Standard identifiers cannot be redefined by the programmer 2. The C language is case sensitive. 3. The C language requires the programmer to declare every variable used in a program. 4. A statement may not extend over multiple lines.
Titles are often justified. ____________________
Answer the following statement true (T) or false (F)
Even when an incident is escalated to a higher level tier in the multi-level support model, the help desk agent who initiated the incident retains ownership of it.
Answer the following statement true (T) or false (F)