COMP 11822

subject Type Homework Help
subject Pages 5
subject Words 441
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A __________ is when a user views a Web page controlled by the attacker that contains
a code that exploits the browser bug and downloads and installs malware on the system
without the user's knowledge or consent.
The MAC service data unit contains any protocol control information needed for the
functioning of the MAC protocol.
A _________ is the result of a query that returns selected rows and columns from one
or more tables.
A __________ cloud infrastructure is made available to the general public or a large
industry group and is owned by an organization selling cloud services.
page-pf2
Concerns about the extent to which personal privacy has been and may be compromised
have led to a variety of legal and technical approaches to reinforcing privacy rights.
The four phases of a typical virus are: dormant phase, triggering phase, execution phase
and __________ phase.
With ______ encryption each vulnerable communications link is equipped on both ends
with an encryption device.
page-pf3
Each layer of code needs appropriate hardening measures in place to provide
appropriate security services.
_________ controls focus on preventing security beaches from occurring by inhibiting
attempts to violate security policies or exploit a vulnerability.
There are two types of keys: ________ used for communication between a STA and an
AP and group keys used for multicast communication.
Identification is the means of establishing the validity of a claimed identity provided by
a user.
page-pf4
________ rights may be used to prevent others from using a confusingly similar mark,
but not to prevent others from making the same goods or from selling the same goods
or services under a clearly different mark.
The secret key is input to the encryption algorithm.
________ controls involve the correct use of hardware and software security
capabilities in systems.
page-pf5
If privileges are greater than those already available to the attacker the result is a
_________.
A _________ is a set of programs installed on a system to maintain covert access to that
system with administrator (root) privileges while hiding evidence of its presence.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.