Question: Question 1 ( 1 point ) A well - formed transaction occurs in a specific authorized sequence, which is monitored and logged. True False Question
Question point
A wellformed transaction occurs in a specific authorized sequence, which is monitored and logged.
True
False
Question point
A secunity perimeter divides trusted systems from the untrusted ones.
True
False
Question point
In a covert storage channel, one process relays information to another by modulating its use of system resources.
True
False
Question point
Covert channels may use malicious sensors or software applications that listen for patterns
True
False
Question point
A covert timing channel is one in which a process writes data to a compromised storage location or sends the information to an illicit process over a network connection.
True
False
Question point
Physical countermeasures are those that have:
quantifiable procedures for damage to assets such as brand damage.
the same characteristics no matter the asset.
both measurable and unmeasurable features
a tangible presence, such as a fireproof storage vault.
Question point
Technical countermeasures are those that
have quantifiable procedures for damage to assets such as brand damage.
only protect technologies and not people
involve some software, system, or application such as a virus scanner
have the same characteristics no malter the asset
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
