In: Computer Science
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources.
2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions.
3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic.
4. T/F. Asymmetric encryption is more secure than symmetric encryption.
Dear Student ,
As per the requirement submitted above , kindly find the below solution.
Question 1:
Answer :True
Explanation :Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources.
**********************
Question 2:
Answer :True
Explanation :When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions.
**********************
Question 3:
Answer :True
Explanation :By default, all virtual private network (VPN) client software encrypts network traffic.
**********************
Question 4:
Answer :True
Explanation :
**********************
NOTE : PLEASE FEEL FREE TO PROVIDE FEEDBACK ABOUT THE SOLUTION.