State a security requirement that is not realistic. State a security requirement that is not verifiable. State two security requirements that are inconsistent

What will be an ideal response?


Not
realistic:
Zero
downtime,
no
confidentiality
loss,
perfect
security.
Not
verifiable:
Reject
all
and
only
the
potentially
harmful
traffic.
Maximum
protection
of
privacy.
Inconsistent:
Full
auditing
of
users'
actions;
cannot
be
used
to
harm
users'
privacy.

Computer Science & Information Technology

You might also like to view...

Draw an ERD for the Parrot Palace information system.

What will be an ideal response?

Computer Science & Information Technology

Fonts in individual placeholders or on specific slides can be changed on the ________ tab

A) View B) Format C) Home D) Design

Computer Science & Information Technology

Unlike pressing [return] on the keyboard, clicking the ____ button on the formula bar accepts the entry while also keeping the cell active.

A. Enter B. Fill C. Wrap Text D. Merge

Computer Science & Information Technology

In the Find and Replace dialog box, using the ________ feature will find words within similar sounds

Fill in the blank(s) with correct word

Computer Science & Information Technology