C. Protects the right of an author to prevent unauthorized use of his/her works.
D. Key exchange
B. Duty to public safety, principals, individuals, and profession.
11. Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to? A. Discretionary Access Control B. Task-initiated Access Control C. Subject-dependent Access Control D. Token-oriented Access Control
A. Discretionary Access Control
12. In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by: A. Protection Profile. B. Target of Evaluation. C. Evaluation Assurance Level 3. D. Evaluation Assurance Level 7.
A. Protection Profile.
B. do not adversely(不利地) affect implementation of the security policy.
D. removing the volume header information.
D. The organization’s published security policy for data classification
B. It provides a clear understanding of potential risk and exposure. # A:它提供了一種傳達安全程序的工具。 B.它提供了對潛在風險和暴露的清晰了解。 C.它提供了一個公開暴露和風險分析的論壇。 D.它提供了一個交流用戶責任的論壇。
C. Provide a mirror image of the hard drive.
B. Statistically predictable.
B. A standalone workstation with Rainbow table and a copied password database.
A. Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
C. Security policy implementation, assignment of roles and responsibilities, and information asset classification.
D. designed originally to meet the information protection needs.
D. limited to as few people as possible.
A. Security stems from the difficulty of calculating the product of two large prime numbers.
C. Immediately inform your company’s management of your findings and its potential ramifications.
44. What is the trusted registry that guarantees the authenticity of client and server public keys? A. Public key notary. B. Certification authority. C. Key distribution center. D. Key revocation certificate.
B. Certification authority.
45. The concept that all accesses must be mediated, protected from unauthorized modification, and verifiable as correct is implemented through what? A. A security model. B. A reference monitor. C. A security kernel. D. A trusted computing base.
C. A security kernel.
A. It helps the management to direct resources to the hardest hit area.
A. forge coded signals that will be accepted as authentic.
D. Determining team members associated with disaster planning.
D. authorization, non-repudiation, and confidentiality.