Question: 9. Trust boundary is a) always drawn between two process in a DFD b) a networks perimeter c) an imaginary boundary between two domains that
9. Trust boundary is
a) always drawn between two process in a DFD
b) a networks perimeter
c) an imaginary boundary between two domains that do not trust each other
d) a boundary between two domains that trust each other
10. Spoofing is an attack that violates the following security property
a) confidentiality
b) integrity
c) availability
d) authentication
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
