MPCS 18984

subject Type Homework Help
subject Pages 5
subject Words 478
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
_________ is a specification for cryptographically signing e-mail messages, permitting
a signing domain to claim responsibility for a message in the mail stream.
Software is an example of real property.
An important aspect of a distributed firewall configuration is security monitoring.
The use of the _________ approach would generally be recommended for small to
medium-sized organizations where the IT systems are not necessarily essential to
meeting the organization's business objectives and additional expenditure on risk
analysis cannot be justified.
page-pf2
During a ______ attack, the attacker sends packets to a known service on the
intermediary with a spoofed source address of the actual target system and when the
intermediary responds, the response is sent to the target.
______ checking is an audit process to review the organization's security processes.
The purpose of the privacy functions is to provide a user protection against discovery
and misuse of identity by other users.
page-pf3
Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a
ciphertext block of 64 bits.
_________ anomaly detection focuses on characterizing the past behavior of individual
users or related groups of users and then detecting significant deviations.
______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement
MAC for IP Security, and is used in other Internet protocols, such as Transport Layer
Security.
The ________ access mode allows the subject neither read nor write access to the
object but may invoke the object for execution.
page-pf4
The _________ is an optional bit string field used to identify uniquely the issuing CA in
the event the X.500 name has been reused for different entities.
"The plaintext is 64 bits in length and the key is 56 bits in length; longer plaintext
amounts are processed in 64-bit blocks" is a description of the DES algorithm.
An object is said to have a security ________ of a given level.
page-pf5
A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.
To respond successfully to a DoS attack a good ______ plan is needed that includes
details of how to contact technical personal for your ISP(s).
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like
operating system.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.