CDA 42348

subject Type Homework Help
subject Pages 6
subject Words 509
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
______ is UNIX's general-purpose logging mechanism found on all UNIX variants and
Linux.
__________ defenses aim to detect and abort attacks in existing programs.
If an organization is dependent on network services it should consider mirroring and
________ these servers over multiple sites with multiple network connections.
______ is the process of defining normal versus unusual events and patterns.
page-pf2
A software utility initially developed at MIT and available both in the public domain
and in commercially supported versions, ________ is the defacto standard for remote
authentication.
"The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and
the preceding 64 bits of ciphertext" is a description of the ________ mode of operation.
The purpose of the authentication phase is to maintain backward compatibility with the
IEEE 802.11 state machine.
page-pf3
The "A" in the CIA triad stands for "authenticity".
One disadvantage of a packet filtering firewall is its simplicity.
The 2001 _________ is the first international treaty seeking to address Internet crimes
by harmonizing national laws, improving investigative techniques, and increasing
cooperation among nations.
A component describes a specific set of security requirements.
page-pf4
A _________ firewall applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet.
If a computer's temperature gets too cold the system can undergo thermal shock when it
is turned on.
_______ refers to a system of moral principles that relates to the benefits and harms of
particular actions, and to the rightness and wrongness of motives and ends of those
actions.
page-pf5
Programmers, developers, and system maintainers require less advanced security
training than other employees.
An employer cannot be held liable for negligent hiring if an employee causes harm to a
third party while acting as an employee.
The _________ provides the most accurate evaluation of an organization's IT system's
security risks.
Power utility problems can be grouped into three categories: undervoltage, overvoltage,
and ________.
page-pf6
The first comprehensive privacy legislation adopted in the United States was the
Privacy Act of 1974.
To exploit any type of buffer overflow the attacker needs to identify a buffer overflow
vulnerability in some program that can be triggered using externally sourced data under
the attackers control.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.