Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) What is a security risk of allowing mobile code to execute on a target machine? The time delay from when it is downloaded and

1) What is a security risk of allowing mobile code to execute on a target machine?

The time delay from when it is downloaded and executed could initiate an asynchronous attack.

It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.

Malware may be included in the downloaded code and infect the target machine.

It will contaminate files that contain computer code, especially .exe and .com files.

2) In which access control mechanism does the operating system determine the access control permissions for subjects?

Role-based

Mandatory

Token-based

Discretionary

3) How does multi-factor authentication improve security?

It denies attacker multiple times.

By using biometrics, no other person can authenticate.

By using a combination of authentications, it is more difficult to gain access by pretending to be an authorized user.

It restricts users to smaller spaces.

4) Map the definition to the corresponding layer of the OSI model.

A. Application Layer 1. Responsible for co-ordinating communication between systems B. Presentation Layer 2. Responsible for putting data packets into data frames from the layer below C. Session Layer 3. Responsible for availability of intended communication partner D. Transport Layer 4. Responsible for transmitting data from node to node with switching and routing technologies E. Network Layer 5. Responsible for negotiating data transfer syntax F. Datalink Layer 6. Responsible for multiplexing upper-layer applications G. Physical Layer 7. Responsible for providing hardware means for sending and receiving data

A 7, B 5, C 1, D 6, E 4, F 2, G 3

A 3, B 1, C 5, D 6, E 4, F 2, G 7

A 3, B 5, C 1, D 4, E 6, F 2, G 7

A 3, B 5, C 1, D 6, E 4, F 2, G 7

5) Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

False negative

True positive

False positive

True negative

6) Which of the following answers refers to a concept of having more than one person required to complete a given task?

Separation of duties

Acceptable use policy

Multifactor authentication

Privacy policy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals, Design, and Implementation

Authors: David M. Kroenke, David J. Auer

14th edition

133876705, 9781292107639, 1292107634, 978-0133876703

More Books

Students also viewed these Databases questions

Question

Different formulas for mathematical core areas.

Answered: 1 week ago