State a security requirement that is not realistic. State a security requirement that is not verifiable. State two security requirements that are inconsistent
What will be an ideal response?
Not
realistic:
Zero
downtime,
no
confidentiality
loss,
perfect
security.
Not
verifiable:
Reject
all
and
only
the
potentially
harmful
traffic.
Maximum
protection
of
privacy.
Inconsistent:
Full
auditing
of
users'
actions;
cannot
be
used
to
harm
users'
privacy.
You might also like to view...
Draw an ERD for the Parrot Palace information system.
What will be an ideal response?
Fonts in individual placeholders or on specific slides can be changed on the ________ tab
A) View B) Format C) Home D) Design
Unlike pressing [return] on the keyboard, clicking the ____ button on the formula bar accepts the entry while also keeping the cell active.
A. Enter B. Fill C. Wrap Text D. Merge
In the Find and Replace dialog box, using the ________ feature will find words within similar sounds
Fill in the blank(s) with correct word