The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the

layered approach.

What will be an ideal response?


Example
answers:
Modularity
and
encapsulation,
least
privilege,
least
common
mechanism.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A disadvantage of a virtual network is that it cannot be rapidly scaled to respond to shifting demands. 2. Two key tools in measuring the network performance that an enterprise desires to achieve are quality of service (QoS) and quality of experience (QoE). 3. The "tail drop" technique is when the queue management discipline was to drop any incoming packets when the queue was full. 4. The control plane includes those mechanisms that operate directly on flows of data. 5. In the management plane, traffic restoration refers to the network response to failures.

Computer Science & Information Technology

An ISDN B channel is actually a(n) _______________ channel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ implement software that simulates the movement of objects in the real world, which are affected by things like gravity and the collision of one object with another.

A. Graphics programmers B. Human-Computer Interaction programmers C. Physics programmers D. Data communications programmers

Computer Science & Information Technology

Double-clicking a button object on the Windows Form object opens the event handler for that button.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology