Question

Question 15 pts (TCO 6) _____ control determines the types of Internet services that can be...

Question 15 pts

(TCO 6) _____ control determines the types of Internet services that can be accessed, inbound or outbound.

Behavior
Direction
Service
User

Flag this Question

Question 25 pts

(TCO 6) A _____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

packet filtering
stateful inspection
application-level
circuit-level

Flag this Question

Question 35 pts

(TCO 5) The _____ is the encryption algorithm run in reverse.

decryption algorithm
ciphertext
plaintext
secret key

Flag this Question

Question 45 pts

(TCO 5) If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a _____ attack is possible.

known-plaintext
chosen-plaintext
chosen ciphertext
chosen text

Flag this Question

Question 55 pts

(TCO 4) The _____ control the manner by which a subject may access an object.

security classes
security classifications
security clearances
security properties

Flag this Question

Question 65 pts

(TCO 4) “An individual (or role) may grant to another individual (or role) access to a document based on the owner’s discretion, constrained by the MAC rules” describes the

ss-property.
ds-property.
-property.
cc-property.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 1.) Option- C. (SERVICE)

Answer 2.) Option- D. (Circuit Level)

Answer 3.) Option- A. (Decryption Algorithm)

Answer 4.) Option- B. (Chosen Plain-Text)

Answer 5.) Option- A. (Security Classes)

Answer 6.) Option- B. (ds-property)

Add a comment
Know the answer?
Add Answer to:
Question 15 pts (TCO 6) _____ control determines the types of Internet services that can be...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT