Question 15 pts
(TCO 6) _____ control determines the types of Internet services that can be accessed, inbound or outbound.
Behavior |
Direction |
Service |
User |
Flag this Question
Question 25 pts
(TCO 6) A _____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.
packet filtering |
stateful inspection |
application-level |
circuit-level |
Flag this Question
Question 35 pts
(TCO 5) The _____ is the encryption algorithm run in reverse.
decryption algorithm |
ciphertext |
plaintext |
secret key |
Flag this Question
Question 45 pts
(TCO 5) If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a _____ attack is possible.
known-plaintext |
chosen-plaintext |
chosen ciphertext |
chosen text |
Flag this Question
Question 55 pts
(TCO 4) The _____ control the manner by which a subject may access an object.
security classes |
security classifications |
security clearances |
security properties |
Flag this Question
Question 65 pts
(TCO 4) “An individual (or role) may grant to another individual (or role) access to a document based on the owner’s discretion, constrained by the MAC rules” describes the
ss-property. |
ds-property. |
-property. |
cc-property. |
Answer 1.) Option- C. (SERVICE)
Answer 2.) Option- D. (Circuit Level)
Answer 3.) Option- A. (Decryption Algorithm)
Answer 4.) Option- B. (Chosen Plain-Text)
Answer 5.) Option- A. (Security Classes)
Answer 6.) Option- B. (ds-property)
Question 15 pts (TCO 6) _____ control determines the types of Internet services that can be...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...