MPCS 99590

subject Type Homework Help
subject Pages 6
subject Words 506
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A servicemark is the same as a trademark except that it identifies and distinguishes the
source of a service rather than a product.
Operational controls range from simple to complex measures that work together to
secure critical and sensitive data, information, and IT systems functions.
_______ is the process of making copies of data at regular intervals allowing the
recovery of lost or corrupted data over relatively short time periods of a few hours to
some weeks.
Controls can be classified as belonging to one of the following classes: management
controls, operational controls, technical controls, detection and recovery controls,
preventative controls, and _______ controls.
page-pf2
An IPS incorporates IDS functionality but also includes mechanisms designed to block
traffic from intruders.
The information transfer path by which unauthorized data is obtained is referred to as
an ___________ channel.
A __________ virus is explicitly designed to hide itself from detection by anti-virus
software.
page-pf3
The value of a primary key must be unique for each tuple of its table.
Any device that contains an IEEE 802.11 conformant MAC and physical layer is a
basic service set.
Kerberos is designed to counter only one specific threat to the security of a client/server
dialogue.
A packet filtering firewall is typically configured to filter packets going in both
directions.
page-pf4
_______ systems should validate all patches on test systems before deploying them to
production systems.
Once the IT management process is in place and working the process never needs to be
repeated.
The __________ is the human with overall responsibility for setting the security policy
of the organization, and, thus, for decisions about deploying and configuring the IDS.
page-pf5
Messages in the BSD syslog format consist of three parts: PRI, Header, and ___.
An auditing function monitors and keeps a record of user accesses to system resources.
Misuse of the physical infrastructure includes vandalism, theft of equipment, theft by
copying, theft of services, and unauthorized entry.
In a discretionary access control environment database users are classified into three
broad categories: administrator, end user other than application owner, and
__________.
page-pf6
Buffer overflow exploits are no longer a major source of concern to security
practitioners.
The cloud carrier is useful when cloud services are too complex for a cloud consumer to
easily manage.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.