In which system life cycle phase should security policy be


1. (TCO 10) Secure hashing is also known as _____.

public-key cryptography

a message digest

Transport Layer Security

Secure Sockets Layer

IPSec

Question 2. 2. (TCO 10) Which of the following uses symmetric-key or shared-secret cryptography?

RSA

Diffie Hellman

MD5

PSA

Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of the following?

7 - application

4 - transport

3 - network

2 - data link

1 - physical

Question 4. 4. (TCO 11) Four general techniques used by firewalls are object control, direction control, behavior control, and _____.

flow control

subject control

access control

audit control

authentication control

Question 5. 5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

software

remote procedure calls

agent technology

common interfaces

access to local audit records

Question 6. 6. (TCO 12) The Internet Engineering Task Force Intrusion Detection working group has developed a standard called the _____.

Intrusion Detection Standard

Intrusion Detection Framework

Intrusion Detection Data Model

Intrusion Detection Exchange Format

Intrusion Detection Data Format

Question 7. 7. (TCO 12) _____ intrusions are harder to detect than _____ intrusions.

Anomalous, misuse

Misuse, anomalous

Well-defined, unplanned

Well-planned, automated

Automated, well-planned

Question 8. 8. (TCO 13) Which form of malware is dependent on operating systems and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

Question 9. 9. (TCO 13) In which system life cycle phase should security policy be established?

Test and evaluation

Operations and maintenance

Requirements definition

Acquisition

Initiation

Question 10. 10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer.

An antivirus program

Malware

A firewall

A logic bomb

A trojan horse

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: In which system life cycle phase should security policy be
Reference No:- TGS01367716

Now Priced at $30 (50% Discount)

Recommended (94%)

Rated (4.6/5)