Question: Q 2 - Answer the following with True & false. ( ) Honeypots are made to attrack the attackers who is trying to get access
Q 2 - Answer the following with True & false.
( ) Honeypots are made to attrack the attackers who is trying to get access of highly valuable or confidential documents, to trap the attackers.
( ) Firewall controls the incoming and the outgoing connections and processes on a system.
( ) agents are the ones that analyze the data from directors and take actions.
( ) salting slows down dictionary attacks.
( ) The bell-padula model is used for data integrity where the biba is used for confidentiality.
( ) It is the safest option to write down the password in plain text rather than storing it in hash value.
( ) counterattack can hurt the innocent party
( ) ACL is the row of the access control matrix
( ) the capability list the column of access control matrix.
( ) mandatory access control is the best to be used in an enterprise environment.
( )Trojan horse is a malicious software that acts as a legitimate piece of the tool in order to accept the user to collect personal information from the user.
( )if the shift cipher is used with 3 shift space than the message will be attack at dawn.
( ) the interchange key is the cryptographic key that has more to do with the user than the connection of the users.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
