Exam 11: Security Topics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the process of receiving an e-mail.

(Essay)
4.8/5
(32)

What are the steps to develop a secure OS?

(Essay)
4.8/5
(34)

The OSI ____ layer defines all electrical and physical specifications for devices.

(Multiple Choice)
4.9/5
(35)

A ____ is a statement of security the system should enforce when implemented correctly.

(Multiple Choice)
4.9/5
(35)

What are the authentication considerations for network access regarding mobile devices?

(Essay)
4.8/5
(40)

The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.

(Multiple Choice)
4.9/5
(32)

A SMTP server listens on a well-known TCP port ____ for an incoming request.

(Multiple Choice)
4.8/5
(31)

____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.

(Short Answer)
5.0/5
(38)

The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.

(True/False)
4.9/5
(38)

A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.

(Multiple Choice)
4.8/5
(27)

E-mail is one of the most secure types of communication media.

(True/False)
4.8/5
(28)

A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.

(Multiple Choice)
4.7/5
(28)

PGP and S/MIME is compatible at the protocol level.

(True/False)
4.9/5
(27)

Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?

(Essay)
4.9/5
(31)

____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.

(Multiple Choice)
4.8/5
(31)

Security applies to every aspect of computing.

(True/False)
4.8/5
(37)

The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.

(Multiple Choice)
4.8/5
(44)

Describe the inter-mail server vulnerability.

(Essay)
4.8/5
(34)

Users can interact directly with the OS through a user interface such as a command language or a(n) ____.

(Multiple Choice)
4.8/5
(26)
Match each item with a statement below:
the first program to be loaded in the computer during start-up
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
Correct Answer:
Verified
Premises:
Responses:
the first program to be loaded in the computer during start-up
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Network
the basis of OS protection
SMTP
defined in RFC 821 and amended by RFC 1123
SSL
a system of interconnected elements
Role-based access control
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Sarbanes-Oxley Act
should be used as the first step to address security on mobile devices
Separation
(Matching)
4.9/5
(36)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)