Deck 11: Security Topics

ملء الشاشة (f)
exit full mode
سؤال
9)All e-mail servers communicate with each other using ____.

A) SSH
B) FTP
C) SMTP
D) HTTP
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
15)A ____ is a statement of security the system should enforce when implemented correctly.

A) security policy
B) security model
C) security plan
D) security tree
سؤال
19)The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.

A) transport
B) network
C) session
D) data link
سؤال
7)A SMTP server listens on a well-known TCP port ____ for an incoming request.

A) 21
B) 25
C) 110
D) 115
سؤال
18)The OSI ____ layer provides the mechanisms to establish, manage, and terminate connections between applications.

A) session
B) transport
C) network
D) presentation
سؤال
6)____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.

A) SMTP
B) TCP
C) IP
D) SSL
سؤال
4)PGP and S/MIME is compatible at the protocol level.
سؤال
12)The OS provides its services through a well-defined ____.

A) GUI
B) UI
C) command line interface
D) API
سؤال
8)The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.

A) TCP
B) IP
C) ICMP
D) POP
سؤال
13)Users can interact directly with the OS through a user interface such as a command language or a(n) ____.

A) GUI
B) API
C) DLL
D) DBMS
سؤال
Security applies to every aspect of computing.
سؤال
2)E-mail is one of the most secure types of communication media.
سؤال
10)The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.

A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
سؤال
5)The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.
سؤال
14)____ and segmentation can provide a way of managing main memory.

A) Sectoring
B) Clustering
C) Paging
D) Partitioning
سؤال
20)The OSI ____ layer defines all electrical and physical specifications for devices.

A) network
B) application
C) data link
D) physical
سؤال
11)____ is the first step in providing security for databases.

A) Access control
B) ACL
C) Authentication
D) Authorization
سؤال
3)E-mail messages are stored in plain, unencrypted text on SMTP servers.
سؤال
16)A ____ is a representation of the security policy of the OS.

A) security plan
B) security tree
C) security infrastructure
D) security model
سؤال
17)A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.

A) domain
B) computer network
C) computer cluster
D) computer partition
سؤال
31)A(n) ____________________ is the fundamental component of the computer system.
سؤال
22)____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

A) TCP
B) IP
C) UDP
D) ICMP
سؤال
33)What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?
سؤال
36)Describe the mail access vulnerability.
سؤال
41)What are the four types of separation supported by an OS?
سؤال
25)A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.

A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
سؤال
29)A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.
سؤال
35)Describe the inter-mail server vulnerability.
سؤال
26)____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
سؤال
30)The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
سؤال
28)____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.
سؤال
38)What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?
سؤال
24)A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.

A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
سؤال
40)Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?
سؤال
27)____________________ is the de facto standard for e-mail transmission.
سؤال
21)____ is a name given to the collection of networking protocols that have been used to construct the global Internet.

A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
سؤال
39)What are the authentication considerations for network access regarding mobile devices?
سؤال
23)The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
سؤال
34)Describe the process of receiving an e-mail.
سؤال
37)Briefly describe e-mail identity spoofing.
سؤال
Match between columns
the first program to be loaded in the computer during start-up
SMTP
the first program to be loaded in the computer during start-up
Network
the first program to be loaded in the computer during start-up
SSL
the first program to be loaded in the computer during start-up
Operating system
the first program to be loaded in the computer during start-up
Authentication
the first program to be loaded in the computer during start-up
Sarbanes-Oxley Act
the first program to be loaded in the computer during start-up
S/MIME
the first program to be loaded in the computer during start-up
Separation
the first program to be loaded in the computer during start-up
Role-based access control
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SMTP
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Network
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SSL
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Sarbanes-Oxley Act
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
S/MIME
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Separation
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Role-based access control
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SMTP
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Network
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SSL
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Operating system
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Sarbanes-Oxley Act
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Separation
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Role-based access control
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SMTP
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Network
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SSL
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Operating system
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Authentication
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Sarbanes-Oxley Act
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
S/MIME
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Separation
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Role-based access control
the basis of OS protection
SMTP
the basis of OS protection
Network
the basis of OS protection
SSL
the basis of OS protection
Operating system
the basis of OS protection
Authentication
the basis of OS protection
Sarbanes-Oxley Act
the basis of OS protection
S/MIME
the basis of OS protection
Separation
the basis of OS protection
Role-based access control
defined in RFC 821 and amended by RFC 1123
SMTP
defined in RFC 821 and amended by RFC 1123
Network
defined in RFC 821 and amended by RFC 1123
SSL
defined in RFC 821 and amended by RFC 1123
Operating system
defined in RFC 821 and amended by RFC 1123
Authentication
defined in RFC 821 and amended by RFC 1123
Sarbanes-Oxley Act
defined in RFC 821 and amended by RFC 1123
S/MIME
defined in RFC 821 and amended by RFC 1123
Separation
defined in RFC 821 and amended by RFC 1123
Role-based access control
a system of interconnected elements
SMTP
a system of interconnected elements
Network
a system of interconnected elements
SSL
a system of interconnected elements
Operating system
a system of interconnected elements
Authentication
a system of interconnected elements
Sarbanes-Oxley Act
a system of interconnected elements
S/MIME
a system of interconnected elements
Separation
a system of interconnected elements
Role-based access control
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SMTP
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Network
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SSL
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Operating system
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Authentication
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Sarbanes-Oxley Act
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
S/MIME
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Separation
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Role-based access control
should be used as the first step to address security on mobile devices
SMTP
should be used as the first step to address security on mobile devices
Network
should be used as the first step to address security on mobile devices
SSL
should be used as the first step to address security on mobile devices
Operating system
should be used as the first step to address security on mobile devices
Authentication
should be used as the first step to address security on mobile devices
Sarbanes-Oxley Act
should be used as the first step to address security on mobile devices
S/MIME
should be used as the first step to address security on mobile devices
Separation
should be used as the first step to address security on mobile devices
Role-based access control
سؤال
What are the steps to develop a secure OS?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Security Topics
1
9)All e-mail servers communicate with each other using ____.

A) SSH
B) FTP
C) SMTP
D) HTTP
C
2
15)A ____ is a statement of security the system should enforce when implemented correctly.

A) security policy
B) security model
C) security plan
D) security tree
A
3
19)The OSI ____ layer provides switching and routing technologies for transmitting data from node to node.

A) transport
B) network
C) session
D) data link
B
4
7)A SMTP server listens on a well-known TCP port ____ for an incoming request.

A) 21
B) 25
C) 110
D) 115
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
18)The OSI ____ layer provides the mechanisms to establish, manage, and terminate connections between applications.

A) session
B) transport
C) network
D) presentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
6)____ is a simple text-based protocol where one or more recipients of a message are specified and then the message text is transferred.

A) SMTP
B) TCP
C) IP
D) SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
4)PGP and S/MIME is compatible at the protocol level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
12)The OS provides its services through a well-defined ____.

A) GUI
B) UI
C) command line interface
D) API
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
8)The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.

A) TCP
B) IP
C) ICMP
D) POP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
13)Users can interact directly with the OS through a user interface such as a command language or a(n) ____.

A) GUI
B) API
C) DLL
D) DBMS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Security applies to every aspect of computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
2)E-mail is one of the most secure types of communication media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
10)The two common database formats are relational, using constructs such as tables, views, and procedures, and ____, using objects and hierarchy.

A) procedure-oriented
B) object-oriented
C) hierarchy-based
D) view-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
5)The DBMS should provide fine-grained access control besides the file permissions that control the OS user's access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
14)____ and segmentation can provide a way of managing main memory.

A) Sectoring
B) Clustering
C) Paging
D) Partitioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
20)The OSI ____ layer defines all electrical and physical specifications for devices.

A) network
B) application
C) data link
D) physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
11)____ is the first step in providing security for databases.

A) Access control
B) ACL
C) Authentication
D) Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
3)E-mail messages are stored in plain, unencrypted text on SMTP servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
16)A ____ is a representation of the security policy of the OS.

A) security plan
B) security tree
C) security infrastructure
D) security model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
17)A ____ is a group of computers and peripherals connected together to communicate with each other and to share information and resources.

A) domain
B) computer network
C) computer cluster
D) computer partition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
31)A(n) ____________________ is the fundamental component of the computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
22)____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

A) TCP
B) IP
C) UDP
D) ICMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
33)What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
36)Describe the mail access vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
41)What are the four types of separation supported by an OS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
25)A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.

A) application gateway
B) route-filtering
C) packet-filtering
D) proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
29)A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
35)Describe the inter-mail server vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
26)____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

A) Multifactor authentication
B) Database authentication
C) Biometrics
D) RADIUS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
30)The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
28)____________________ is a standard for public key encryption and signing of e-mail encapsulated in MIME.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
38)What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
24)A(n) ____ firewall scans all network packets and blocks all but selected network traffic according to policies set in the firewall.

A) proxy
B) route-filtering
C) application gateway
D) packet-filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
40)Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
27)____________________ is the de facto standard for e-mail transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
21)____ is a name given to the collection of networking protocols that have been used to construct the global Internet.

A) SSL
B) HTTPS
C) TCP/IP
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
39)What are the authentication considerations for network access regarding mobile devices?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
23)The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A) denial of service
B) TCP SYN flood
C) IP spoofing
D) IP session hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
34)Describe the process of receiving an e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
37)Briefly describe e-mail identity spoofing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
the first program to be loaded in the computer during start-up
SMTP
the first program to be loaded in the computer during start-up
Network
the first program to be loaded in the computer during start-up
SSL
the first program to be loaded in the computer during start-up
Operating system
the first program to be loaded in the computer during start-up
Authentication
the first program to be loaded in the computer during start-up
Sarbanes-Oxley Act
the first program to be loaded in the computer during start-up
S/MIME
the first program to be loaded in the computer during start-up
Separation
the first program to be loaded in the computer during start-up
Role-based access control
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SMTP
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Network
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
SSL
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Operating system
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Authentication
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Sarbanes-Oxley Act
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
S/MIME
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Separation
specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
Role-based access control
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SMTP
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Network
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
SSL
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Operating system
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Authentication
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Sarbanes-Oxley Act
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
S/MIME
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Separation
ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
Role-based access control
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SMTP
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Network
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
SSL
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Operating system
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Authentication
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Sarbanes-Oxley Act
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
S/MIME
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Separation
every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
Role-based access control
the basis of OS protection
SMTP
the basis of OS protection
Network
the basis of OS protection
SSL
the basis of OS protection
Operating system
the basis of OS protection
Authentication
the basis of OS protection
Sarbanes-Oxley Act
the basis of OS protection
S/MIME
the basis of OS protection
Separation
the basis of OS protection
Role-based access control
defined in RFC 821 and amended by RFC 1123
SMTP
defined in RFC 821 and amended by RFC 1123
Network
defined in RFC 821 and amended by RFC 1123
SSL
defined in RFC 821 and amended by RFC 1123
Operating system
defined in RFC 821 and amended by RFC 1123
Authentication
defined in RFC 821 and amended by RFC 1123
Sarbanes-Oxley Act
defined in RFC 821 and amended by RFC 1123
S/MIME
defined in RFC 821 and amended by RFC 1123
Separation
defined in RFC 821 and amended by RFC 1123
Role-based access control
a system of interconnected elements
SMTP
a system of interconnected elements
Network
a system of interconnected elements
SSL
a system of interconnected elements
Operating system
a system of interconnected elements
Authentication
a system of interconnected elements
Sarbanes-Oxley Act
a system of interconnected elements
S/MIME
a system of interconnected elements
Separation
a system of interconnected elements
Role-based access control
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SMTP
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Network
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
SSL
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Operating system
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Authentication
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Sarbanes-Oxley Act
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
S/MIME
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Separation
a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
Role-based access control
should be used as the first step to address security on mobile devices
SMTP
should be used as the first step to address security on mobile devices
Network
should be used as the first step to address security on mobile devices
SSL
should be used as the first step to address security on mobile devices
Operating system
should be used as the first step to address security on mobile devices
Authentication
should be used as the first step to address security on mobile devices
Sarbanes-Oxley Act
should be used as the first step to address security on mobile devices
S/MIME
should be used as the first step to address security on mobile devices
Separation
should be used as the first step to address security on mobile devices
Role-based access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the steps to develop a secure OS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.