Question: Question 19 2 pts (TCO 4) Security classes are referred to as security clearances. security classifications. security levels. security properties. Flag this Question Question 20

Question 192 pts

(TCO 4) Security classes are referred to as

security clearances.
security classifications.
security levels.
security properties.

Flag this Question

Question 202 pts

(TCO 4) _____ is a process that ensures a system is developed and operated as intended by the systems security policy.

Trust
Assurance
Evaluation
Functionality

Flag this Question

Question 212 pts

(TCO 5) Cryptographic systems are generically classified by

the type of operations used for transforming plaintext to ciphertext.
the number of keys used.
the way in which the plaintext is processed.
All of the above

Flag this Question

Question 222 pts

(TCO 5) The exact substitutions and transformations performed by the algorithm depend on the

ciphertext.
decryption algorithm.
secret key.
encryption algorithm.

Flag this Question

Question 232 pts

(TCO 5) _____ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

Session key
Subkey
Key distribution technique
Ciphertext key

Flag this Question

Question 242 pts

(TCO 5) Public-key encryption was developed in the late

1950s.
1970s.
1960s.
1980s.

Flag this Question

Question 252 pts

(TCO 5) _____ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.

ECB
OFB
CFB
CTR

Flag this Question

Question 262 pts

(TCO 6) _____ control controls how particular services are used.

Service
Behavior
User
Direction

Flag this Question

Question 272 pts

(TCO 6) An example of a circuit-level gateway implementation is the _____ package.

application-level
SOCKS
SMTP
stateful inspection

Flag this Question

Question 282 pts

(TCO 6) Typically, the systems in the _____ require or foster external connectivity, such as a corporate website, an e-mail server, or a DNS server.

DMZ
IP protocol field
boundary firewall
VPN

Flag this Question

Question 292 pts

(TCO 6) Typical for SOHO applications, a _____ is a single router between internal and external networks with stateless or full packet filtering.

single bastion T
double bastion inline
screening router
host-resident firewall

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!