Question
(TCO 1) A loss of _____ is the unauthorized disclosure of information. confidentiality authenticity integrity availability Flag this Question Question 2 3 pts (TCO 1)
(TCO 1) A loss of _____ is the unauthorized disclosure of information.
confidentiality |
authenticity |
integrity |
availability |
Flag this Question
Question 23 pts
(TCO 1) _____ are used to send large volumes of unwanted e-mail.
Rootkits |
Spammer programs |
Downloaders |
Auto-rooter |
Flag this Question
Question 33 pts
(TCO 2) _____ relates to the capacity of the network links connecting a server to the wider Internet.
Application resource |
Network bandwidth |
System payload |
Directed broadcast |
Flag this Question
Question 43 pts
(TCO 2) _____ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.
Application-based |
System-based |
Random |
Amplification |
Flag this Question
Question 53 pts
(TCO 2) The buffer overflow type of attack has been known since it was first widely used by the _____ Worm in 1988.
Code Red |
Slammer |
Morris Internet |
Alpha One |
Flag this Question
Question 63 pts
(TCO 2) A stack buffer overflow is also referred to as
stack framing. |
stack smashing. |
stack shocking. |
stack running. |
Flag this Question
Question 73 pts
(TCO 2) Defensive programming is sometimes referred to as
variable programming. |
secure programming. |
interpretive programming. |
chroot programming. |
Flag this Question
Question 83 pts
(TCO 2) Incorrect handling of program _____ is one of the most common failings in software security.
lines |
input |
output |
disciplines |
Flag this Question
Question 93 pts
(TCO 3) In the case of _____ only the digital signature is encoded using base64.
enveloped data |
signed and enveloped data |
signed data |
clear-signed data |
Flag this Question
Question 103 pts
(TCO 3) The result of S/MIME encrypting the digest using DSS and the senders private DSS key is the
digital signature. |
envelope. |
digest code. |
mail extension. |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started