Page 1
C191 Latest Questions and Correct
Answers
In the UNIX operating system, a domain is associated with the
Ans: user
The most common method used by attackers to breach
security is
Ans: masquerading
In MULTICS, the protection domains are organized in a
Ans: ring structure
A code segment that misuses its environment is called
Ans: a Trojan horse
In an access matrix, the ____ right allows a process to change
the entries in a row.
Ans: control
Worms ____
, Page 2
Ans: use the spawn mechanism to ravage system
performance / can shut down an entire network /
continue to grow as the Internet expands
The ____ implementation of an access table consists of sets
of ordered triples.
Ans: global table
A denial of service attack is ____.
Ans: aimed at disrupting legitimate use of a system
In capability lists, each object has a ____ to denote its type
Ans: tag
In a paired-password system, ____.
Ans: the computer supplies one part of a password and
the user enters the other part
Which of the following implementations of the access matrix
is a compromise between two other implementations listed
below?
Ans: lock-key
, Page 3
A ____ virus changes each time it is installed to avoid
detection by antivirus software.
Ans: polymorphic
In the reacquisition scheme for implementing the revocation
of capabilities, ____.
Ans: capabilities are periodically deleted from each
domain
____ is a symmetric stream cipher.
Ans: RC4
Which of the following is an advantage of compiler-based
enforcement of access control?
Ans: Access privileges are closely related to the
linguistic concept of a data type.
A ____ is a public key digitally signed by a trusted party.
Ans: digital certificate
Which of the following is a true statement regarding the
relative merits between access rights enforcement based
solely on a kernel, as opposed to enforcement provided
largely by a compiler?
C191 Latest Questions and Correct
Answers
In the UNIX operating system, a domain is associated with the
Ans: user
The most common method used by attackers to breach
security is
Ans: masquerading
In MULTICS, the protection domains are organized in a
Ans: ring structure
A code segment that misuses its environment is called
Ans: a Trojan horse
In an access matrix, the ____ right allows a process to change
the entries in a row.
Ans: control
Worms ____
, Page 2
Ans: use the spawn mechanism to ravage system
performance / can shut down an entire network /
continue to grow as the Internet expands
The ____ implementation of an access table consists of sets
of ordered triples.
Ans: global table
A denial of service attack is ____.
Ans: aimed at disrupting legitimate use of a system
In capability lists, each object has a ____ to denote its type
Ans: tag
In a paired-password system, ____.
Ans: the computer supplies one part of a password and
the user enters the other part
Which of the following implementations of the access matrix
is a compromise between two other implementations listed
below?
Ans: lock-key
, Page 3
A ____ virus changes each time it is installed to avoid
detection by antivirus software.
Ans: polymorphic
In the reacquisition scheme for implementing the revocation
of capabilities, ____.
Ans: capabilities are periodically deleted from each
domain
____ is a symmetric stream cipher.
Ans: RC4
Which of the following is an advantage of compiler-based
enforcement of access control?
Ans: Access privileges are closely related to the
linguistic concept of a data type.
A ____ is a public key digitally signed by a trusted party.
Ans: digital certificate
Which of the following is a true statement regarding the
relative merits between access rights enforcement based
solely on a kernel, as opposed to enforcement provided
largely by a compiler?