12 Only vendor-authorized programs may be used on the system. 4. When the account number is entered, the customer information associated with that account will be retrieved and displayed. 15 18...


Match the mechanism with the policy it enforces


12<br>Only vendor-authorized<br>programs may be used on<br>the system.<br>4. When the account number is<br>entered, the customer information<br>associated with that account will be<br>retrieved and displayed.<br>15<br>18<br>Customers of the store may<br>use the web to check their<br>accounts.<br>5. The login mechanism checks that<br>the password entered corresponds<br>to the user account entered.<br>1<br>Employees may not stream<br>videos during work hours.<br>Only users physically<br>present at the system can<br>6. Each program will be checked to<br>ensure it is approved for use by the<br>vendor before the program is run.<br>use it.<br>7. Networks have been disconnected<br>from the system.<br>

Extracted text: 12 Only vendor-authorized programs may be used on the system. 4. When the account number is entered, the customer information associated with that account will be retrieved and displayed. 15 18 Customers of the store may use the web to check their accounts. 5. The login mechanism checks that the password entered corresponds to the user account entered. 1 Employees may not stream videos during work hours. Only users physically present at the system can 6. Each program will be checked to ensure it is approved for use by the vendor before the program is run. use it. 7. Networks have been disconnected from the system.
Match the mechanism with the policy it enforces.<br>12<br>1. File protection mechanisms allow a<br>user to turn off read permission for<br>the group

Extracted text: Match the mechanism with the policy it enforces. 12 1. File protection mechanisms allow a user to turn off read permission for the group "students". 15 Users must pick passwords that are hard to guess. 18 Student files will be protected so other students cannot read them. 2. The password changing program requires all passwords to be at least 16 characters long, with at least 2 digits, 2 symbols (like "+" or "@"), and both upper and lower case letters. 21 Users must authenticate themselves before using the system. The company blocks all streaming video from entering its internal network. 3. Only vendor-authorized programs may be used on the system. 4. When the account number is entered, the customer information associated with that account will be

Jun 05, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here