Term
Which type of security model is built on the state machine concept? |
|
Definition
|
|
Term
The trustworthy computing initiative includes four goals. What are these goals? |
|
Definition
Privacy
Reliability
Security
Business Integrity |
|
|
Term
|
Definition
Personal Area Network: is a small personal use network that is characterized by its greatly limited reach. It can connect to an individuals electronic devices to each other or to a larger network. (Bluetooth is an example) |
|
|
Term
Which of these correctly describes terms used to classify the devices at the user end of a network interface?
-Bridges
-Connection host
-Switches
-Data Terminal Equipment |
|
Definition
Data Terminal Equipment- It is the form of HW used for transmission and receipt of data on the user end. |
|
|
Term
The Business Impact Analysis (BIA) includes which of the following?
-Estimate year-end earnings
-Form a mission statement
-Develop a process Gantt Chart
-Identify organizational risks |
|
Definition
Identify Organizational Risks |
|
|
Term
The Clark-Wilson model of security address what main goal of security?
What are the main goals of this pillar of security? |
|
Definition
Integrity
Consistency of Data
Prevention of Unauthorized Modifications (authorized or unauthorized)
|
|
|
Term
In Application Development, agents perform all of the following services EXCEPT which?
-Patch Management
-Loading Virus Software
-Performance and Capacity Monitoring
-Host-based IDS |
|
Definition
Loading Virus Software.
This requires human intervention. |
|
|