Question: Question 19 2 pts (TCO 4) Security classes are referred to as security clearances. security classifications. security levels. security properties. Flag this Question Question 20
Question 192 pts
(TCO 4) Security classes are referred to as
| security clearances. |
| security classifications. |
| security levels. |
| security properties. |
Flag this Question
Question 202 pts
(TCO 4) _____ is a process that ensures a system is developed and operated as intended by the systems security policy.
| Trust |
| Assurance |
| Evaluation |
| Functionality |
Flag this Question
Question 212 pts
(TCO 5) Cryptographic systems are generically classified by
| the type of operations used for transforming plaintext to ciphertext. |
| the number of keys used. |
| the way in which the plaintext is processed. |
| All of the above |
Flag this Question
Question 222 pts
(TCO 5) The exact substitutions and transformations performed by the algorithm depend on the
| ciphertext. |
| decryption algorithm. |
| secret key. |
| encryption algorithm. |
Flag this Question
Question 232 pts
(TCO 5) _____ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.
| Session key |
| Subkey |
| Key distribution technique |
| Ciphertext key |
Flag this Question
Question 242 pts
(TCO 5) Public-key encryption was developed in the late
| 1950s. |
| 1970s. |
| 1960s. |
| 1980s. |
Flag this Question
Question 252 pts
(TCO 5) _____ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.
| ECB |
| OFB |
| CFB |
| CTR |
Flag this Question
Question 262 pts
(TCO 6) _____ control controls how particular services are used.
| Service |
| Behavior |
| User |
| Direction |
Flag this Question
Question 272 pts
(TCO 6) An example of a circuit-level gateway implementation is the _____ package.
| application-level |
| SOCKS |
| SMTP |
| stateful inspection |
Flag this Question
Question 282 pts
(TCO 6) Typically, the systems in the _____ require or foster external connectivity, such as a corporate website, an e-mail server, or a DNS server.
| DMZ |
| IP protocol field |
| boundary firewall |
| VPN |
Flag this Question
Question 292 pts
(TCO 6) Typical for SOHO applications, a _____ is a single router between internal and external networks with stateless or full packet filtering.
| single bastion T |
| double bastion inline |
| screening router |
| host-resident firewall |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
