Question: Question 1 5 pts (TCO 6) _____ control determines the types of Internet services that can be accessed, inbound or outbound. Behavior Direction Service User
Question 15 pts
(TCO 6) _____ control determines the types of Internet services that can be accessed, inbound or outbound.
| Behavior |
| Direction |
| Service |
| User |
Flag this Question
Question 25 pts
(TCO 6) A _____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.
| packet filtering |
| stateful inspection |
| application-level |
| circuit-level |
Flag this Question
Question 35 pts
(TCO 5) The _____ is the encryption algorithm run in reverse.
| decryption algorithm |
| ciphertext |
| plaintext |
| secret key |
Flag this Question
Question 45 pts
(TCO 5) If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a _____ attack is possible.
| known-plaintext |
| chosen-plaintext |
| chosen ciphertext |
| chosen text |
Flag this Question
Question 55 pts
(TCO 4) The _____ control the manner by which a subject may access an object.
| security classes |
| security classifications |
| security clearances |
| security properties |
Flag this Question
Question 65 pts
(TCO 4) An individual (or role) may grant to another individual (or role) access to a document based on the owners discretion, constrained by the MAC rules describes the
| ss-property. |
| ds-property. |
| -property. |
| cc-property. |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
