Question: Q 2 - Answer the following with True & false. ( ) Honeypots are made to attrack the attackers who is trying to get access

Q 2 - Answer the following with True & false.

( ) Honeypots are made to attrack the attackers who is trying to get access of highly valuable or confidential documents, to trap the attackers.

( ) Firewall controls the incoming and the outgoing connections and processes on a system.

( ) agents are the ones that analyze the data from directors and take actions.

( ) salting slows down dictionary attacks.

( ) The bell-padula model is used for data integrity where the biba is used for confidentiality.

( ) It is the safest option to write down the password in plain text rather than storing it in hash value.

( ) counterattack can hurt the innocent party

( ) ACL is the row of the access control matrix

( ) the capability list the column of access control matrix.

( ) mandatory access control is the best to be used in an enterprise environment.

( )Trojan horse is a malicious software that acts as a legitimate piece of the tool in order to accept the user to collect personal information from the user.

( )if the shift cipher is used with 3 shift space than the message will be attack at dawn.

( ) the interchange key is the cryptographic key that has more to do with the user than the connection of the users.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!