Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following statements explains the problem with overclassification? By over classifying information, document markings are wasted and may have run-out when more highly

image text in transcribedimage text in transcribedimage text in transcribed

Which of the following statements explains the problem with overclassification? By over classifying information, document markings are wasted and may have run-out when more highly classified information is revealed. Over classification results in too many documents being classified which can result in anti-competitive behaviour and administrative errors. Classification should occur once information is created. Classification over and over again can result in the sensitivity rating to be increased unnecessarily. Over classification can result in limited or delayed access to official information as well as the actual classification being de-valued or ignored by recipients. Over classification occurs when a correctly classified document is reclassified by a higher authority. By over-ruling the original classification, the higher authority exercises undue influence on the correct document classification. What is effect of the hash loop which repeated hashes data many thousands of times? How would this improve security of the password file? The hash includes the salt, which means rainbow attacks are impossible. The hash loop takes time to execute. By increasing the time cost of calculating hashes, the password file becomes harder to brute force because each password or brute force guess takes thousands of times longer to test. The hash loop means the chances of guessing the password are reduced because an attacker doesn't know how many times the loop was run. The attacker needs to guess the password AND the iteration count. The hash loop extends the password length, making the password much harder to guess. Extending the password length protects against dictionary attacks. The hash loop improves the collision resistance of the hash function. Because all hash functions have a slim probability of a hash collision. repeated hashing reduces the likelihood. Improving collision resistance improves password security. Following a breach of email address and password, which of the following correctly summarises the change to, the user's vulnerabilities? If the user does not reuse-passwords, only the user's forum account will be vulnerable to a password-list attack. If the password was hashed AND salted. The attacker is unable to guess the password. If the password was not salted it will be easily cracked. The user's email has been compromised so all their accounts can be easily hacked. Because this is only a minor breach, and the user's forum ID is only used on one forum, only the user's forum account is vulnerable to a password attack. The user's email address is vulnerable to hacking, the user's forum ID can be re-used to gain access to the forum, the hacker can attack their IP address and their password is vulnerable to dictionary attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Databases A Tour

Authors: Shashi Shekhar, Sanjay Chawla

1st Edition

0130174807, 978-0130174802

More Books

Students also viewed these Databases questions

Question

How can a set agenda help you run a successful meeting

Answered: 1 week ago

Question

Are my points each supported by at least two subpoints?

Answered: 1 week ago