State a security requirement that is not realistic. State a security requirement that is not verifiable. State two security requirements that are inconsistent.

What will be an ideal response?


Not realistic: Zero downtime, no confidentiality loss, perfect security.

Not verifiable: Reject all and only the potentially harmful traffic. Maximum protection of privacy.

Inconsistent: Full auditing of users’ actions; cannot be used to harm users’ privacy.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The break statement allows you to skip one iteration in a loop. 2. The continue statement is used to skip all or part of a loop iteration and then finishes the rest of the loop's iterations. 3. The following code will accurately find the average of four numbers entered by the user: ``` var sum = 0; for(var count = 0; count < 4; count++) sum = sum + parseFloat(prompt("Enter a number:"); var average = sum/count; ``` 4. Desk checking is only used to check the results of summing or averaging values. 5. The accumulator is the variable that holds the total of a sum of values in a loop.

Computer Science & Information Technology

A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts?

A. MAC spoofing B. Dynamic IPs C. MAC filtering D. Static IPs

Computer Science & Information Technology

A(n) _______ volume holds files used to boot the computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case-Based Critical Thinking Questions ? Case 3-1 In PowerPoint 2016, Jim has been inserting text using the text box placeholders included in the slide layout. He wants to be able to add text to other locations on the slide. Jim wants to insert text that appears without a fill color and where the text is left-aligned. Jim should insert a _____.

A. shape with text added B. text box C. slide accent D. picture

Computer Science & Information Technology