You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?
A) No, because the software vendor could have changed the code after testing, which is not verifiable.
B) No, because the software vendor submitted the software to testing authorities only, and did not make the software available to the public for testing.
C) Yes, because the methods were tested by recognized testing authorities, and the source code is protected from vandalism.
D) Yes, because the methods are open, and the system does not rely on the secrecy of its internal mechanisms to provide protection.
E) No, because if a software vendor refuses to reveal the source code for a product, it cannot comply with the open-design principle.
Correct Answer:
Verified
Q50: Which of the following tests provides testing
Q51: A _ attack uses multiple systems to
Q52: What is the purpose of resource isolation?
A)
Q53: Who should have physical access to network-connectivity
Q54: Which of the following represents a valid
Q56: Which of the following is MOST likely
Q57: You are a system administrator managing a
Q58: Public servers are typically placed in the
Q59: Which of the following entities review partner-extranet
Q60: Which of these strategies can be employed
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents