In: Computer Science
5.True
Both SSH and Telnet are remote access protocol but we can say SSH is more secured version of Telnet with an added protection of public-key cryptography while authenticating the connection and then encrypt the session.
6.False
COO in most of the organization are those who are responsible for the everyday operations of the company and they are second in command where they report to the CEO.
Responsibility for cybersecurity varies on different positions depending on the nature of the organization.
7.True
The non-discretionary access control also known as Role-Based Access Control (RBAC) is where there will be different roles and each role has permissions assigned.
For example, the head of accounts will be a role and it has the complete authority of managing the account part of the network.
8.True
This method is known as the block by default method where all the connections are blocked and rules are set to allow the specific traffic only.