A+ GRADED. Buy Quality Materials!
A denial of service attack launched against a network is an interruption attack.
True
Privileges in an access control matrix are associated with groups and roles.
False
An asymmetric encryption method has precisely matched pairs of keys that are
produced together, or of which one key is derived mathematically from the other.
True
A cryptographic checksum can be used as code-tamper protection and to ensure
message integrity in transit.
True
Consider the scenario in which Mandy wishes to provide evidence via a digital
signature that a message she sends to Kate is in fact from her. She also wants to
ensure that only Kate can open the message. The therefore signs the message
with: Mandy's public key and Kate's private key.
Fale
Ensuring that an authorized user in the exams department has access to capture
exam marks on the system is called ...
Access Control
The Advanced Encryption Standard (AES) is regarded as a stringer/stronger
encryption algorithm than triple Des and is known as Rijndael.
True
A program can be validated in several different ways such as cross-checking
each system requirement with the system's source code or execution-time
behavior. The goal is to demonstrate that the system does each thing listed in the
functional requirements.
True
Procedure-oriented access control access to objects is defined based on
privileges associated with groups, such as students, lecturers and exam
department staff.
True
Protecting objects involves several complementary goals such as to ensure that
each subject should have access to the smallest number of objects necessary to
perform some tasks. This is called verify acceptable usage.
False
PKIs use symmetric encryption algorithms to digitally sign certificates.
False
An attacker needs three things: method, opportunity and money to for a
successful attack.
False
A power failure can been seen as a ... that could cause harm.
nonhuman treat