TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Network Security provides authentication and access control for resources. Explanation: The statement is true.
Detailed explanation-2: -Network access control is the act of keeping unauthorized users and devices out of a private network.
Detailed explanation-3: -Which one of the following is not an objective of network security? Explanation: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.
Detailed explanation-4: -Firewall. Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Detailed explanation-5: -Explanation : In terms of Email Security, phishing is one of the standard methods that are used by Hackers to gain access to a network. The Email Security Tools can handle several types of attacks, such as the incoming attacks, and protect the outbound messages containing sensitive data/information as well.