Assume no FTP protocol exists. You are asked to define a function analogous to the FTP PUT for exchange of files. List three security features or mechanisms you would include in your protocol
What will be an ideal response?
(a)
End-?to-?end
error
detection
and
perhaps
correction.
(b)
On
the
receiving
end
control
of
where
file
is
placed.
(c)
On
the
receiving
end
control
of
acknowledgment
for
receipt
of
packets.
(d)
Ability
to
resume
transfer
of
a
failed
transmission
"in
the
middle."
(e)
Optional
end-?to-?end
encryption
for
very
sensitive
files.
Computer Science & Information Technology
You might also like to view...
Time Machine permits the user to select which version of a file to restore
Indicate whether the statement is true or false
Computer Science & Information Technology
The correct function name for overloading the addition (+) operator is:
a. operator+ b. operator(+) c. operator:+ d. operator_+
Computer Science & Information Technology