Kind of constraint that stipulates

Assignment Help Computer Engineering
Reference no: EM13754302

1 What are the means of authenticating a user's identity?

A. Something the individual knows
B. Something the individual possesses
C. Something the individual is
D. Something the individual does
E. All of the above
F. None of the above

2 Lower the false match rate, better the quality of the security application

True False

3 Countermeasure for the theft of system password file

A. Lockout all passwords
B. Fast reissuance of all passwords
C. Enforce a password policy that makes very difficult to guess password
D. User training
E. All of the above

4 List basic techniques to avoid guessable passwords

5 Smart card contains

A. Microprocessor
B. Small database of password and user information
C. A self-erase mechanism in case of suspected misuse
D. All of the above

6 Biometric system can authorize an user to use a computer system, but it cannot authenticate

True False

7 The function of processor in ATM architecture

8 Type of Access control based on how sensitive and important the Object is

A. DAC - Discretionary Access Control
B. MAC - Mandatory Access Control
C. RBAC - Role based Access Control
D. All of the above

9 Kind of constraint that stipulates that a user can be assigned to a role only if that user was already given another role.

A. Cardinality
B. Mutually Exclusive
C. Prerequisite
D. Any one of the above

10 Match the following

A. Subject 1) That can create resource
B. Object 2) That accesses objects
C. Owner 3) Subjects to give minimal access
D. World 4) Entity whose access to control

11 Write down the main difference between Core RBAC and Hierarchical RBAC

12 The protection mechanism that detects potential attack and alerts the administrators

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

13 The protection mechanism used to authenticate remote users

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

14 Administrators can use this tool to check what Servers are offering what services and are vulnerable to what type of attacks

A. Firewalls
B. Port Scanner
C. TACACS
D. IDPS
E. All of the above

15 Following technology (technologies) help to secure emails

A. PGP
B. S/MIME
C. PEM
D. Digital Certificate
E. All of the above

16 Following technology (technologies) help to secure general web browsing and web-based applications such as this class

A. SET
B. SSL
C. SHTTP
D. SSH
E. All of the above

17 Computer Security: Principles and Practice, Second Edition, by William Stallings and Lawrie Brown. Published by Prentice Hall. Copyright © 2012 by Pearson Education, Inc.

Which one of the following is User authentication protocol

A. X.509
B. Kerboros
C. S/MIME
D. All of the above

18 Write down the improvements made in Version 5 Kerboros

19 Which one of the following is Directory authentication protocol

A. X.509
B. Kerboros
C. S/MIME
D. All of the above

20 This Language support remote procedure calls involving complex data objects

A. XML
B. SOAP
C. WS-Security
D. SAML
E. All of the above

21 This Language helps to exchange security information between desperate systems.

A. XML
B. SOAP
C. WS-Security
D. SAML
E. All of the above

22 List the elements of Public Key Infrastructure (PKIX) Model

Reference no: EM13754302

Questions Cloud

Compile a full draft of the final enterprise security plan : Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.
Sdlc method to implement a new technology : Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore
Difference between the ages of the sexes in the group : Conduct a hypothesis test analysis to determine if there is a statistical difference between the ages of the sexes in the group. State what you are testing. Write the hypotheses. Show the relevant numbers. Then explain your results. Use alpha = .0..
What this group of islands is found north of new guinea : What this group of islands is found north of new guinea and east of philippines?
Kind of constraint that stipulates : Kind of constraint that stipulates that a user can be assigned to a role only if that user was already given another role.
Explain the information-gathering techniques : Describe the information-gathering techniques and design methods you would propose for the project. Identify the key factors that help ensure the information required for the project is gathered successfully
What is the return on equity ratio : M&BS Life Corporation has a net profit margin of 10%. It has a total asset turnover ratio of 3X. The debt to total assets ratio is 50%. What is the return on equity ratio?
How patriot use so-called boston massacre to their advantage : How did the Patriots use the so-called Boston "massacre" to their advantage? Why was this important?
User interface design : Review the Principles of User Interface Design presentation located in the Week Three section of the student website. Evaluate a website of your choice for adherence to the six design principles outlined in the presentation

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the different types of project feasibility factors

List and discuss the different types of project feasibility factors.

  Developing an algorithm to read an arbitrary number

Develop an algorithm to read an arbitrary number of the data records, each consisting of an age, name, and code.

  Multi-dimensional arrays can cost a lot of memory

Multi-dimensional arrays may cost a lot of memory. How much memory (how many bytes) does it take to create an integer array of 3 dimensions, with each dimension having 1000 elements (i.e. int myHugeArrays[1000] [1000] [1000]).

  Some programming languages a comment can be enclosed

In some programming languages a comment can be enclosed either in braces {} or in the symbols (* *). How do you think a scanner will group the four symbols {, }, (*, *) for purposes of classification i.e. would each symbol be given its own classif..

  Create a 3 dimensional array

Create a 3 dimensional array. The array should be initialized to zeroes. Create a program that will accept entries for ship locations. Ships will have to have the same Z value.

  What is the impact of information technology in your daily

information technology is the process of using computers or computing devices to obtain and handle information and

  Describe the information systems supporting the major

the final paper will demonstrate the students ability to assimilate synthesize and apply the concepts of management

  Would this proposed solution meet the requirements

Your company has just occupied an old historic building in which 15 employees will work. because of historic building codes, the company is not permitted to run cables inside walls or ceilings.

  Transfering the power over ethernet

A recent article in an industry magazine discussed the ability to transfer the Power over Ethernet (PoE) and an emerging technology which is able to transfer the Power over Fiber (PoF).

  How the project manager guard against the natural tendency

It is sometimes suggested that time estimates for I.T. project work elements should be generated primarily by those involved in carrying out the work (e.g. analysts and programmers).

  System analysis and design

In the System Analysis and Design: Design Patterns – How widely used are design patterns in today’s development environments.

  What processes and properties would you include

Visual Basic.NET allows you to create your own classes. Provide an instance of a useful class you could create. What methods and properties would you include? Show an example of a method declaration for your class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd