Match each term with the correct statement below.
A. Limits any damage that might occur from an intrusion or violation
B. Establishes that the subject is trusted
C. Ensures that all intrusions and violations are detected
D. Ensures that the subject is assigned appropriate access privileges
E. Ensures restoration of the data to a prior state in case of disaster
F. Establishes that subjects are who they say they are
G. Ensures that all requisite measures are in place to prevent harm
H. Ensures that access privileges are monitored and enforced
I. Ensures that all intrusions and violations are punished
A. Containment
B. Identification
C. Detection
D. Authorization
E. Recovery
F. Authentication
G. Prevention
H. Accountability
I. Deterrence
You might also like to view...
If logic bombs or Trojan horses were to be snuck in, what type of file would the easiest target?
A. JAR files B. Java files C. SQL scripts D. ANT scripts
In a laser printer, the _______________ uses friction to isolate a single sheet any others that were picked up.
A. duplexing assembly B. separation pad C. transfer roller D. gearbox
What are the benefits to businesses provided by wireless LANs?
What will be an ideal response?
The ____ class in the System.Windows.Forms namespace enables you to add more functionality to your application by offering additional user options, such as adding layers of menus.
A. MenuStrip B. MenuDialog C. Main D. DialogMenu