CAPP 86329

subject Type Homework Help
subject Pages 6
subject Words 504
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
__________ programming is a form of design intended to ensure the continuing
function of a piece of software in spite of unforeseeable usage of the software.
A __________ authentication system attempts to authenticate an individual based on his
or her unique physical characteristics.
______ virtualization systems are more common in clients, where they run along side
other applications on the host OS, and are used to support applications for alternate
operating system versions or types.
In a ___________ administration a small number of privileged users may grant and
revoke access rights.
page-pf2
The field following the MSDU field is referred to as the ___________.
Encryption is a pervasive service that can be provided for data at rest in the cloud.
Snort Inline enables Snort to function as an intrusion prevention capability.
page-pf3
A __________ is a collection of bots capable of acting in a coordinated manner.
The ________ is housed in the user's computer and is referred to as a client e-mail
program or a local network e-mail server.
A ________ uses encryption and authentication in the lower protocol layers to provide a
secure connection through an otherwise insecure network, typically the Internet.
The _________ to an IDS enables a user to view output from the system or control the
behavior of the system.
page-pf4
The _________ Act confers certain rights on individuals and obligations on credit
reporting agencies.
The first order of business in security audit trail design is the selection of data items to
capture.
A _______ is an independent review and examination of a system's records and
activities.
page-pf5
A __________ can occur as a result of a programming error when a process attempts to
store data beyond the limits of a fixed-size buffer and consequently overwrites adjacent
memory locations.
No cybercriminal databases exist that can point investigators to likely suspects.
_________ secure is a class of system that has system resources at more than one
security level and that permits concurrent access by users who differ in security
clearance and need-to-know, but is able to prevent each user from accessing resources
for which the user lacks authorization.
_________ is a process used to achieve and maintain appropriate levels of
confidentiality, integrity, availability, accountability, authenticity, and reliability.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.