Answer the following statements true (T) or false (F)
1. Access control is the central element of computer security.
2. The authentication function determines who is trusted for a given purpose.
3. An auditing function monitors and keeps a record of user accesses to
system resources.
4. External devices such as firewalls cannot provide access control services.
5. The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.
1. True
2. False
3. True
4. False
5. True
You might also like to view...
Your worksheet automatically calculates the ____ and displays the results.
A. equations B. cells C. scenarios D. formulas
In most client-server applications, the port number of a server is a well-known number (e.g., an FTP server uses port number 21, the Telnet server uses port number 23, etc.), while the client uses a currently available (ephemeral) port number. DHCP is different. Here, both the client and the server use a well-known port: UDP port 67 for the DHCP server and UDP port 68 for the DHCP client. Refer to RFC 2131 and provide an explanation for this protocol design choice.
What will be an ideal response?
Which of the following optical storage media has the greatest storage capacity?
A) DVD DL B) DVD C) BD D) CD
for loop variables can be declared and initialized within a for loop initializing list.
Answer the following statement true (T) or false (F)