answersLogoWhite

0

Collisions can decrease network performance.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What does CSMACD stand for?

I am not sure but htis is what I found on Google. Carrier Sense Multiple Access Collision Detect


What type of access control is determined by configuring an access control list or ACL?

Discretionary Access Control


What is a software control?

"Access control" means that you control who has access to certain things - so an access control software is software that helps you achieve that.


How can you control the access to a system?

You can control the access to a system by buying or downloading certain programs. An example of a program that gives you the ability to control the access to a system is Network Access Control.


Explain the access mechanism of a magnetic disk how is this access mechanism different in RAID level5?

Explain the access mechanism of a Magnetic disk. How is this access mechanism different in RAID level 5?


What is the difference between access control list and access control entry?

Access Control list is the audit settings and security settings of objects. whereas Access Control Entry is the entry within the ACL. mightymax


What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


With the discretionary access control model the most common control implementation is through?

access control lists


What is the difference between discretionary and mandatory access control?

In the most common implementations of Discretionary Access Control, users "own" their directories and the files and programs they contain. They can grant and deny access and execution privileges for these to other users. Users can also be parts of groups. They may be able grant or restrict access to all members of a group.In Mandatory Access Control the operating system controls the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. The object or target can be something like a process, a file, a directory, a program, or a memory segment. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernal compares these security attributes to the policy and decides whether the access or operation will be allowed. With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted.


Logical access control method can be used to limit access to specific resources in a domain environment?

Access control list (ACL)


A stateful firewall uses what type of access control?

Context-dependent access control


Restricting access to files based on the indentity of the user or group is an example of which on what?

DAC - Discretionary Access Control.