SEC 571 Week 4 Midterm (Version 3)
Multiple Choice & Essay (Score: 100 / 100 (100%)
- Question : (TCO A) What are the four kinds of security threats? Give two examples of each.
- Question : (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system.
- Question : (TCO B) It’s ….. that firewalls are dead. Some think that, because of the prevalence of application-layer attacks, packet filtering firewalls are of no real use in protecting networks. Name three advantages of using packet filtering firewalls in modern networks.
- Question : (TCO C) Respond to each part of this question:
- Describe how a long number (encryption key) can …. shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.
- Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.
- Question : (TCO B) Which of the following is a correct statement?