This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
A servicemark is the same as a trademark except that it identifies and distinguishes the
source of a service rather than a product.
Operational controls range from simple to complex measures that work together to
secure critical and sensitive data, information, and IT systems functions.
_______ is the process of making copies of data at regular intervals allowing the
recovery of lost or corrupted data over relatively short time periods of a few hours to
some weeks.
Controls can be classified as belonging to one of the following classes: management
controls, operational controls, technical controls, detection and recovery controls,
preventative controls, and _______ controls.
An IPS incorporates IDS functionality but also includes mechanisms designed to block
traffic from intruders.
The information transfer path by which unauthorized data is obtained is referred to as
an ___________ channel.
A __________ virus is explicitly designed to hide itself from detection by anti-virus
software.
The value of a primary key must be unique for each tuple of its table.
Any device that contains an IEEE 802.11 conformant MAC and physical layer is a
basic service set.
Kerberos is designed to counter only one specific threat to the security of a client/server
dialogue.
A packet filtering firewall is typically configured to filter packets going in both
directions.
_______ systems should validate all patches on test systems before deploying them to
production systems.
Once the IT management process is in place and working the process never needs to be
repeated.
The __________ is the human with overall responsibility for setting the security policy
of the organization, and, thus, for decisions about deploying and configuring the IDS.
Messages in the BSD syslog format consist of three parts: PRI, Header, and ___.
An auditing function monitors and keeps a record of user accesses to system resources.
Misuse of the physical infrastructure includes vandalism, theft of equipment, theft by
copying, theft of services, and unauthorized entry.
In a discretionary access control environment database users are classified into three
broad categories: administrator, end user other than application owner, and
__________.
Buffer overflow exploits are no longer a major source of concern to security
practitioners.
The cloud carrier is useful when cloud services are too complex for a cloud consumer to
easily manage.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.