Answers
user - CORRECT ANSWER In the UNIX operating system, a domain is associated
with the
masquerading - CORRECT ANSWER The most common method used by attackers
to breach security is
ring structure - CORRECT ANSWER In MULTICS, the protection domains are
organized in a
a Trojan horse - CORRECT ANSWER A code segment that misuses its environment
is called
control - CORRECT ANSWER In an access matrix, the ____ right allows a process to
change the entries in a row.
use the spawn mechanism to ravage system performance / can shut down an
entire network / continue to grow as the Internet expands - CORRECT ANSWER
Worms ____
global table - CORRECT ANSWER The ____ implementation of an access table
consists of sets of ordered triples.
,aimed at disrupting legitimate use of a system - CORRECT ANSWER A denial of
service attack is ____.
tag - CORRECT ANSWER In capability lists, each object has a ____ to denote its
type
the computer supplies one part of a password and the user enters the other part -
CORRECT ANSWER In a paired-password system, ____.
lock-key - CORRECT ANSWER Which of the following implementations of the
access matrix is a compromise between two other implementations listed below?
polymorphic - CORRECT ANSWER A ____ virus changes each time it is installed to
avoid detection by antivirus software.
capabilities are periodically deleted from each domain - CORRECT ANSWER In the
reacquisition scheme for implementing the revocation of capabilities, ____.
RC4 - CORRECT ANSWER ____ is a symmetric stream cipher.
Access privileges are closely related to the linguistic concept of a data type. -
CORRECT ANSWER Which of the following is an advantage of compiler-based
enforcement of access control?
digital certificate - CORRECT ANSWER A ____ is a public key digitally signed by a
trusted party.
, Enforcement by the kernel is less flexible than enforcement by the programming
language for user-defined policy. - CORRECT ANSWER Which of the following is a
true statement regarding the relative merits between access rights enforcement
based solely on a kernel, as opposed to enforcement provided largely by a
compiler?
Network - CORRECT ANSWER ____ layer security generally has been standardized
on IPSec.
When a class is loaded, the JVM assigns the class to a protection domain that
gives the permissions of that class. - CORRECT ANSWER Which of the following is
true of the Java programming language in relation to protection?
It is commonly used for secure communication on the Internet. - CORRECT
ANSWER Which of the following is true of SSL?
tracks - CORRECT ANSWER The surface of a magnetic disk platter is divided into
____.
Source - CORRECT ANSWER A(n) ____ file is a sequence of functions.
block at a time - CORRECT ANSWER Transfers between memory and disk are
performed a ____.
control - CORRECT ANSWER The ____ register of an I/O port can be written by the
host to start a command or to change the mode of a device.