Client/Server Computing: Q91. In Java, all classes are checked. a. true b. false Q92. An important issue in designing secure systems is to decide at
Client/Server Computing:
Q91. In Java, all classes are checked. a. true b. false Q92. An important issue in designing secure systems is to decide at which level security mechanisms should be placed. a. true b. false Q93. If we are to put our trust in a computer system, then confidentiality and integrity should also taken into account. Confidentiality refers to the property of a computer system whereby its information is disclosed only to authorized parties. Integrity is the characteristic that alterations to a system's assets can be made only in an authorized way. a. true b. false Q94. Formally speaking, verifying access rights is referred to as access control, whereas authorization is about granting access rights. a. true b. false Q95. When considering the protection of a possibly distributed application, we should: a. concentrate on protection of the data that is associated with the application. b. ensure data integrity by specifying exactly which operations may be invoked, and by whom, and when certain data or resources may be accessed. c. focus on users, specifying which users have access to the application, regardless of the operations they want to do. d. all of the above.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started