Deck 11: Security Topics

Full screen (f)
exit full mode
Question
9)All e-mail servers communicate with each other using ____.

A) SSH
B) FTP
C) SMTP
D) HTTP
Use Space or
up arrow
down arrow
to flip the card.
Question
15)A ____ is a statement of security the system should enforce when implemented correctly.

A) security policy
B) security model
C) security plan
D) security tree
Question
19)The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.

A) transport
B) network
C) session
D) data link
Question
7)A SMTP server listens on a well-known TCP port ____ for an incoming request.

A) 21
B) 25
C) 110
D) 115
Question
18)The OSI ____ layer provides the mechanisms to establish, manage, and terminate connections between applications.

A) session
B) transport
C) network
D) presentation
Question
6)____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.

A) SMTP
B) TCP
C) IP
D) SSL
Question
4)PGP and S/MIME is compatible at the protocol level.
Question
12)The OS provides its services through a well-defined ____.

A) GUI
B) UI
C) command line interface
D) API
Question
8)The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.

A) TCP
B) IP
C) ICMP
D) POP
Question
13)Users can interact directly with the OS through a user interface such as a command language or a(n) ____.

A) GUI
B) API
C) DLL
D) DBMS
Question
Security applies to every aspect of computing.
Question
2)E-mail is one of the most secure types of communication media.
Question
10)The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.

A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
Question
5)The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.
Question
14)____ and segmentation can provide a way of managing main memory.

A) Sectoring
B) Clustering
C) Paging
D) Partitioning
Question
20)The OSI ____ layer defines all electrical and physical specifications for devices.

A) network
B) application
C) data link
D) physical
Question
11)____ is the first step in providing security for databases.

A) Access control
B) ACL
C) Authentication
D) Authorization
Question
3)E-mail messages are stored in plain, unencrypted text on SMTP servers.
Question
16)A ____ is a representation of the security policy of the OS.

A) security plan
B) security tree
C) security infrastructure
D) security model
Question
17)A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.

A) domain
B) computer network
C) computer cluster
D) computer partition
Question
31)A(n) ____________________ is the fundamental component of the computer system.
Question
22)____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

A) TCP
B) IP
C) UDP
D) ICMP
Question
33)What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?
Question
36)Describe the mail access vulnerability.
Question
41)What are the four types of separation supported by an OS?
Question
25)A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.

A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
Question
29)A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.
Question
35)Describe the inter-mail server vulnerability.
Question
26)____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
Question
30)The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
Question
28)____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.
Question
38)What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?
Question
24)A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.

A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
Question
40)Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?
Question
27)____________________ is the de facto standard for e-mail transmission.
Question
21)____ is a name given to the collection of networking protocols that have been used to construct the global Internet.

A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
Question
39)What are the authentication considerations for network access regarding mobile devices?
Question
23)The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
Question
34)Describe the process of receiving an e-mail.
Question
37)Briefly describe e-mail identity spoofing.
Question
Match between columns
the first program to be loaded in the computer during start-up
SMTP
the first program to be loaded in the computer during start-up
Network
the first program to be loaded in the computer during start-up
SSL
the first program to be loaded in the computer during start-up
Operating system
the first program to be loaded in the computer during start-up
Authentication
the first program to be loaded in the computer during start-up
Sarbanes-Oxley Act
the first program to be loaded in the computer during start-up
S/MIME
the first program to be loaded in the computer during start-up
Separation
the first program to be loaded in the computer during start-up
Role-based access control
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SMTP
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Network
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SSL
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Sarbanes-Oxley Act
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
S/MIME
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Separation
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Role-based access control
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SMTP
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Network
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SSL
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Operating system
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Sarbanes-Oxley Act
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Separation
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Role-based access control
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SMTP
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Network
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SSL
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Operating system
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Authentication
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Sarbanes-Oxley Act
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
S/MIME
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Separation
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Role-based access control
the basis of OS protection
SMTP
the basis of OS protection
Network
the basis of OS protection
SSL
the basis of OS protection
Operating system
the basis of OS protection
Authentication
the basis of OS protection
Sarbanes-Oxley Act
the basis of OS protection
S/MIME
the basis of OS protection
Separation
the basis of OS protection
Role-based access control
defined in RFC 821 and amended by RFC 1123
SMTP
defined in RFC 821 and amended by RFC 1123
Network
defined in RFC 821 and amended by RFC 1123
SSL
defined in RFC 821 and amended by RFC 1123
Operating system
defined in RFC 821 and amended by RFC 1123
Authentication
defined in RFC 821 and amended by RFC 1123
Sarbanes-Oxley Act
defined in RFC 821 and amended by RFC 1123
S/MIME
defined in RFC 821 and amended by RFC 1123
Separation
defined in RFC 821 and amended by RFC 1123
Role-based access control
a system of interconnected elements
SMTP
a system of interconnected elements
Network
a system of interconnected elements
SSL
a system of interconnected elements
Operating system
a system of interconnected elements
Authentication
a system of interconnected elements
Sarbanes-Oxley Act
a system of interconnected elements
S/MIME
a system of interconnected elements
Separation
a system of interconnected elements
Role-based access control
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SMTP
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Network
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SSL
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Operating system
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Authentication
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Sarbanes-Oxley Act
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
S/MIME
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Separation
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Role-based access control
should be used as the first step to address security on mobile devices
SMTP
should be used as the first step to address security on mobile devices
Network
should be used as the first step to address security on mobile devices
SSL
should be used as the first step to address security on mobile devices
Operating system
should be used as the first step to address security on mobile devices
Authentication
should be used as the first step to address security on mobile devices
Sarbanes-Oxley Act
should be used as the first step to address security on mobile devices
S/MIME
should be used as the first step to address security on mobile devices
Separation
should be used as the first step to address security on mobile devices
Role-based access control
Question
What are the steps to develop a secure OS?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Security Topics
1
9)All e-mail servers communicate with each other using ____.

A) SSH
B) FTP
C) SMTP
D) HTTP
C
2
15)A ____ is a statement of security the system should enforce when implemented correctly.

A) security policy
B) security model
C) security plan
D) security tree
A
3
19)The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.

A) transport
B) network
C) session
D) data link
B
4
7)A SMTP server listens on a well-known TCP port ____ for an incoming request.

A) 21
B) 25
C) 110
D) 115
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
18)The OSI ____ layer provides the mechanisms to establish, manage, and terminate connections between applications.

A) session
B) transport
C) network
D) presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
6)____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.

A) SMTP
B) TCP
C) IP
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
4)PGP and S/MIME is compatible at the protocol level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
12)The OS provides its services through a well-defined ____.

A) GUI
B) UI
C) command line interface
D) API
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
8)The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.

A) TCP
B) IP
C) ICMP
D) POP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
13)Users can interact directly with the OS through a user interface such as a command language or a(n) ____.

A) GUI
B) API
C) DLL
D) DBMS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Security applies to every aspect of computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
2)E-mail is one of the most secure types of communication media.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
10)The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.

A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
5)The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
14)____ and segmentation can provide a way of managing main memory.

A) Sectoring
B) Clustering
C) Paging
D) Partitioning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
20)The OSI ____ layer defines all electrical and physical specifications for devices.

A) network
B) application
C) data link
D) physical
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
11)____ is the first step in providing security for databases.

A) Access control
B) ACL
C) Authentication
D) Authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
3)E-mail messages are stored in plain, unencrypted text on SMTP servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
16)A ____ is a representation of the security policy of the OS.

A) security plan
B) security tree
C) security infrastructure
D) security model
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
17)A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.

A) domain
B) computer network
C) computer cluster
D) computer partition
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)A(n) ____________________ is the fundamental component of the computer system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
22)____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

A) TCP
B) IP
C) UDP
D) ICMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
33)What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
36)Describe the mail access vulnerability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
41)What are the four types of separation supported by an OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
25)A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.

A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
29)A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
35)Describe the inter-mail server vulnerability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
26)____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
30)The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
28)____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
38)What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
24)A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.

A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
27)____________________ is the de facto standard for e-mail transmission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
21)____ is a name given to the collection of networking protocols that have been used to construct the global Internet.

A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
39)What are the authentication considerations for network access regarding mobile devices?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
23)The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
34)Describe the process of receiving an e-mail.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
37)Briefly describe e-mail identity spoofing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
the first program to be loaded in the computer during start-up
SMTP
the first program to be loaded in the computer during start-up
Network
the first program to be loaded in the computer during start-up
SSL
the first program to be loaded in the computer during start-up
Operating system
the first program to be loaded in the computer during start-up
Authentication
the first program to be loaded in the computer during start-up
Sarbanes-Oxley Act
the first program to be loaded in the computer during start-up
S/MIME
the first program to be loaded in the computer during start-up
Separation
the first program to be loaded in the computer during start-up
Role-based access control
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SMTP
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Network
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SSL
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Sarbanes-Oxley Act
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
S/MIME
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Separation
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Role-based access control
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SMTP
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Network
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SSL
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Operating system
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Sarbanes-Oxley Act
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Separation
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Role-based access control
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SMTP
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Network
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SSL
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Operating system
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Authentication
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Sarbanes-Oxley Act
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
S/MIME
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Separation
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Role-based access control
the basis of OS protection
SMTP
the basis of OS protection
Network
the basis of OS protection
SSL
the basis of OS protection
Operating system
the basis of OS protection
Authentication
the basis of OS protection
Sarbanes-Oxley Act
the basis of OS protection
S/MIME
the basis of OS protection
Separation
the basis of OS protection
Role-based access control
defined in RFC 821 and amended by RFC 1123
SMTP
defined in RFC 821 and amended by RFC 1123
Network
defined in RFC 821 and amended by RFC 1123
SSL
defined in RFC 821 and amended by RFC 1123
Operating system
defined in RFC 821 and amended by RFC 1123
Authentication
defined in RFC 821 and amended by RFC 1123
Sarbanes-Oxley Act
defined in RFC 821 and amended by RFC 1123
S/MIME
defined in RFC 821 and amended by RFC 1123
Separation
defined in RFC 821 and amended by RFC 1123
Role-based access control
a system of interconnected elements
SMTP
a system of interconnected elements
Network
a system of interconnected elements
SSL
a system of interconnected elements
Operating system
a system of interconnected elements
Authentication
a system of interconnected elements
Sarbanes-Oxley Act
a system of interconnected elements
S/MIME
a system of interconnected elements
Separation
a system of interconnected elements
Role-based access control
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SMTP
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Network
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SSL
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Operating system
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Authentication
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Sarbanes-Oxley Act
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
S/MIME
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Separation
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Role-based access control
should be used as the first step to address security on mobile devices
SMTP
should be used as the first step to address security on mobile devices
Network
should be used as the first step to address security on mobile devices
SSL
should be used as the first step to address security on mobile devices
Operating system
should be used as the first step to address security on mobile devices
Authentication
should be used as the first step to address security on mobile devices
Sarbanes-Oxley Act
should be used as the first step to address security on mobile devices
S/MIME
should be used as the first step to address security on mobile devices
Separation
should be used as the first step to address security on mobile devices
Role-based access control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the steps to develop a secure OS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.