【正文】
tity of the sender o To enable transmission in a digital format15 In a Public Key Infrastructure, how are public keys published?o They are sent via . o Through digital certificates. o They are sent by owners. o They are not published.16 Which best describes a tool (. keyfob, calculator, memory card or smart card) used to supply dynamic passwords? Tickets ?Tokens Token passing networks Coupons 17 The three classic ways of authenticating yourself to the puter security software are by something you know, by something you have, and by something: you need. nontrivial. ?you are. you can get. 18. Which of the following statements pertaining to the BellLaPadula is false if you are NOT making use of the strong star property? It does not allow read up. It does not address covert channels. It does not address management of access controls. ?It does not allow write up. 19Which of the following is true of a system with Mandatory Access Control (MAC)??The system determines which users or groups may access a file. A user can set up an access list for the file(s), and the system checks both users and groups against this list before granting access. A user can specify which groups of users can access their files, but the system determines group membership. No control is being enforced on this model. 20 What does the simple integrity axiom mean in the Biba model? No write down ?No read down No read up No write up 21 Which of the following are measures against password sniffing? A. Passwords must not be sent through in plain text. B. Passwords must not be stored in plain text on any electronic media. C. You may store passwords electronically if it is encrypted. D. All of the choices.22Which of the following actions can increase the cost of an exhaustive attack? A. Increase the age of a password. B. Increase the length of a password. C. None of the choices. D. Increase the history of a password.23. Which of the following will you consider as a program that monitors data traveling over a network? A. Smurfer B. Sniffer C. Fragmenter D. Spoofer24. 4. With Discretionary access controls, who determines who has access and what privilege they have?A. Resource ownersB. End usersC. Only the administratorsD. No Answer is Correct14。摸清對方最薄弱的環(huán)節(jié)和守衛(wèi)最松散的時刻,為下一步的入侵提供良好的策略。常見的踩點方法包括:在域名及其注冊機構(gòu)的查詢,公司性質(zhì)的了解,對主頁進(jìn)行分析,郵件地址的搜集和目標(biāo)IP地址范圍查詢。(2)通信安全服務(wù):用來認(rèn)證數(shù)據(jù)機要性與完整性,以及各通信的可信賴性。聯(lián)網(wǎng)安全通過訪問控制服務(wù)和通信安全服務(wù)兩方面的安全服務(wù)來達(dá)到。操作系統(tǒng)安全,操作系統(tǒng)必須能區(qū)分用戶