Risk of control being transferred to a duplicate sytem
Question 2
Question
User [blank_start]Access[blank_end] Levels control who can access all the folders and files on a network [blank_start]server.[blank_end] Different groups of users can be [blank_start]assigned[blank_end] different rights, for example some may be able to read [blank_start]files[blank_end], while others can edit or delete them.
Answer
Access
Dictation
files
python code
server.
CPU
assigned
signed
Question 3
Question
Strong Passwords ensure each user's account remains [blank_start]secure[blank_end]. They should be changed [blank_start]regularly[blank_end] and have different [blank_start]passwords[blank_end] for different sites. It should contain upper and lower case [blank_start]letters[blank_end], numbers and characters, but not user identifiable items e.g. [blank_start]date[blank_end] of birth, phone number.
Answer
regularly
occassionally
rarely
letters
integers
passwords
encryptions
date
year
secure
changeable
Question 4
Question
Encryption converts [blank_start]data[blank_end] into a form that cannot be [blank_start]understood[blank_end] by unauthorised [blank_start]users[blank_end]. The message is encrypted with recipient's [blank_start]public[blank_end] key. The recipient [blank_start]decrypts[blank_end] it with their own private key.