Question

1. Among other things the X.800 Security Architecture defines security services and security mechanisms that are...

1. Among other things the X.800 Security Architecture defines security services and security mechanisms that are used by security professionals in implementing security in a network infrastructure.

True

False

2. The larger the symmetric key the stronger the key is from brute force or cryptanalysis cracking?

True

False

3. An application level gateway that is hardened or secured to protect against security attacks is known as what?___________

4. What is used to verify a functional requirement is met? ___________

5. Routers can be set up at the boundary between the internet and a system or in the interior of a system.

True

False

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer For The First Question

1. Among other things the X.800...................

Answer:True, why?

X.800 , is the recommended security architecture for OSI by ITU(International Telecommunication Union).

The OSI security architecture focuses on security attacks, mechanisms, and services.These can be defined as,

Security attack: Any action that compromises the security of information
owned by an organization.
• Security mechanism: A process (or a device incorporating such a process) that
is designed to detect, prevent, or recover from a security attack.
• Security service: A processing or communication service that enhances the
security of the data processing systems and the information transfers of an
organization. The services are intended to counter security attacks, and they
make use of one or more security mechanisms to provide the service.

Answer For The Second Question

2. The larger the symmetric key the stronger the key..........

Answer:True, why?

In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).

Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), since the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the security is determined entirely by the keylength).For instance, Triple DES was designed to have a 168 bit key, but an attack of complexity 2112 is now known. So key length does matter

Answer For The Third Question

3. An application level gateway that is hardened or secured..........

Answer, Firewall /  Application proxy

An application-level gateway, also called an application proxy.

An application gateway or application level gateway (ALG) is a firewall proxy which provides network security. It filters incoming node traffic to certain specifications which mean that only transmitted network application data is filtered.

Answer For The Fourth Question

4. What is used to verify a functional requirement is met?.......

Answer:Analysis

A functional requirement defines a function of a system or its component, where a function is described as a specification of behavior between outputs and inputs

Use cases, entity relationship diagrams, and other models are built to validate the requirement by analyst.

Analysis is the verification of a product or system using models, calculations and testing equipment. Analysis allows someone to make predictive statements about the typical performance of a product or system based on the confirmed test results of a sample set or by combining the outcome of individual tests to conclude something new about the product or system.

Answer For The Fifth Question

5. Routers can be set up at the boundary between the internet and a system .........

Answer:True ,why?

The router is the gateway between the Internet and your home network.The main purpose of a router is to connect multiple networks and forward packets destined either for its own networks or other networks. A router is considered a layer-3 device because its primary forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address.

Add a comment
Know the answer?
Add Answer to:
1. Among other things the X.800 Security Architecture defines security services and security mechanisms that are...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Chapter overview 1. Reasons for international trade Resources reasons Economic reasons Other reasons 2. Difference between...

    Chapter overview 1. Reasons for international trade Resources reasons Economic reasons Other reasons 2. Difference between international trade and domestic trade More complex context More difficult and risky Higher management skills required 3. Basic concept s relating to international trade Visible trade & invisible trade Favorable trade & unfavorable trade General trade system & special trade system Volume of international trade & quantum of international trade Commodity composition of international trade Geographical composition of international trade Degree / ratio of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT