MPCS 32615

subject Type Homework Help
subject Pages 5
subject Words 434
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Noise along a power supply line, motors, fans, heavy equipment, microwave relay
antennas, and other computers are all sources of _________.
The __________ user ID is exempt from the usual file access control constraints and
has system wide access.
A smart card contains an entire microprocessor.
An IDS comprises three logical components: analyzers, user interface and _____.
page-pf2
_____ attacks flood the network link to the server with a torrent of malicious packets
competing with valid traffic flowing to the server.
A ________ is a secret key shared by the AP and a STA and installed in some fashion
outside the scope of IEEE 802.11i.
A, pre-shared key
B. master session key
C. pairwise master key
D. group master key
In reflection attacks, the ______ address directs all the packets at the desired target and
any responses to the intermediary.
page-pf3
A ________ IDS monitors traffic at selected points on a network or interconnected set
of networks.
The term ________ refers to a document that details not only the overall security
objectives and strategies, but also procedural policies that define acceptable behavior,
expected practices, and responsibilities.
To create a relationship between two tables, the attributes that define the primary key in
one table must appear as attributes in another table, where they are referred to as a
foreign key.
page-pf4
The level of risk the organization views as acceptable is the organization's __________.
After security basics and literacy, training becomes focused on providing the
knowledge, skills, and abilities specific to an individual's _______ relative to IT
systems.
Search engines support HTTPS.
Physical access control should address not just computers and other IS equipment but
also locations of wiring used to connect systems, equipment and distribution systems,
telephone and communications lines, backup media, and documents.
page-pf5
Company wireless LANs or wireless access points to wired LANs in close proximity
may create overlapping transmission ranges.
Many users choose a password that is too short or too easy to guess.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.