You are on page 1of 12

All correct except Genuine

Correct

True

SYN spoofing attacks


Signature detection

Digital signature

Randomness
Unpredictability

Intrusion detection is based


Involves an attempt

Is the id

strategy
Step is presenting

A Message authentication

Most important

Is to try every
the attacker adds
A signature-based countermeasure to malware: Antivirus .
A .............................. RBAC facility needs create and delete roles, define permissions for
a role, assign and cancel assignment of users to roles. Consolidated
which of the following algorithms is less computation required during encryption?
Public key and symmetric key encryption

The following algorithms require the use of both digital signatures and encryption of their secret
keys?
RSA (everything except scream)

A ______ specifies authorized objects and operations for a particular user.


capability ticket.

User authentication is the process of establishing ------------- in user


identities that are presented electronically to a computer system.
Validity

In a ...................... password checker, the user is allowed to select his or


her own password but at the time of selection, the system checks to see
if the password is allowable or not.
Proactive

You might also like