Kind of constraint that stipulates

Assignment Help Computer Engineering
Reference no: EM13754302

1 What are the means of authenticating a user's identity?

A. Something the individual knows
B. Something the individual possesses
C. Something the individual is
D. Something the individual does
E. All of the above
F. None of the above

2 Lower the false match rate, better the quality of the security application

True False

3 Countermeasure for the theft of system password file

A. Lockout all passwords
B. Fast reissuance of all passwords
C. Enforce a password policy that makes very difficult to guess password
D. User training
E. All of the above

4 List basic techniques to avoid guessable passwords

5 Smart card contains

A. Microprocessor
B. Small database of password and user information
C. A self-erase mechanism in case of suspected misuse
D. All of the above

6 Biometric system can authorize an user to use a computer system, but it cannot authenticate

True False

7 The function of processor in ATM architecture

8 Type of Access control based on how sensitive and important the Object is

A. DAC - Discretionary Access Control
B. MAC - Mandatory Access Control
C. RBAC - Role based Access Control
D. All of the above

9 Kind of constraint that stipulates that a user can be assigned to a role only if that user was already given another role.

A. Cardinality
B. Mutually Exclusive
C. Prerequisite
D. Any one of the above

10 Match the following

A. Subject 1) That can create resource
B. Object 2) That accesses objects
C. Owner 3) Subjects to give minimal access
D. World 4) Entity whose access to control

11 Write down the main difference between Core RBAC and Hierarchical RBAC

12 The protection mechanism that detects potential attack and alerts the administrators

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

13 The protection mechanism used to authenticate remote users

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

14 Administrators can use this tool to check what Servers are offering what services and are vulnerable to what type of attacks

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

15 Following technology (technologies) help to secure emails

A. PGP
B. S/MIME
C. PEM
D. Digital Certificate
E. All of the above

16 Following technology (technologies) help to secure general web browsing and web-based applications such as this class

A. SET
B. SSL
C. SHTTP
D. SSH
E. All of the above

17 Computer Security: Principles and Practice, Second Edition, by William Stallings and Lawrie Brown. Published by Prentice Hall. Copyright © 2012 by Pearson Education, Inc.

Which one of the following is User authentication protocol

A. X.509
B. Kerboros
C. S/MIME
D. All of the above

18 Write down the improvements made in Version 5 Kerboros

19 Which one of the following is Directory authentication protocol

A. X.509
B. Kerboros
C. S/MIME
D. All of the above

20 This Language support remote procedure calls involving complex data objects

A. XML
B. SOAP
C. WS-Security
D. SAML
E. All of the above

21 This Language helps to exchange security information between desperate systems.

A. XML
B. SOAP
C. WS-Security
D. SAML
E. All of the above

22 List the elements of Public Key Infrastructure (PKIX) Model

Reference no: EM13754302

Questions Cloud

Compile a full draft of the final enterprise security plan : Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.
Sdlc method to implement a new technology : Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore
Difference between the ages of the sexes in the group : Conduct a hypothesis test analysis to determine if there is a statistical difference between the ages of the sexes in the group. State what you are testing. Write the hypotheses. Show the relevant numbers. Then explain your results. Use alpha = .0..
What this group of islands is found north of new guinea : What this group of islands is found north of new guinea and east of philippines?
Kind of constraint that stipulates : Kind of constraint that stipulates that a user can be assigned to a role only if that user was already given another role.
Explain the information-gathering techniques : Describe the information-gathering techniques and design methods you would propose for the project. Identify the key factors that help ensure the information required for the project is gathered successfully
What is the return on equity ratio : M&BS Life Corporation has a net profit margin of 10%. It has a total asset turnover ratio of 3X. The debt to total assets ratio is 50%. What is the return on equity ratio?
How patriot use so-called boston massacre to their advantage : How did the Patriots use the so-called Boston "massacre" to their advantage? Why was this important?
User interface design : Review the Principles of User Interface Design presentation located in the Week Three section of the student website. Evaluate a website of your choice for adherence to the six design principles outlined in the presentation

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd