Sol_quiz1 - IS2150/TEL2810, Quiz 1, September 8, 2009,...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
IS2150/TEL2810, Quiz 1, September 8, 2009, (Total Points: 15) Name : For each of the statements indicate whether it is True or False (Point: 5) [ F] Integrity violation can always be prevented. [ T] Masquerading attack can result in deception or usurpation . [ T] Given a threat A which is less likely to materialize but can have serious consequences if it does materialize, and another threat B which is quite likely to occur but will have less damaging effect if it materializes, one should focus more on how to prevent A than B. [ T] A Unix system employs a security mechanism M that allows the system to be in a state which belongs to the set of states R , and let S be the set of all secure states for the system. Let r be a state that belongs to R but not to S . The mechanism M is broadly secure. [ T] Confidentiality goals may also include hiding the existence of an entity or a piece of information. Differentiate (Point: 5)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2009 for the course SIS 2150 taught by Professor Joshi during the Spring '09 term at Philadelphia.

Page1 / 4

Sol_quiz1 - IS2150/TEL2810, Quiz 1, September 8, 2009,...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online