100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C191 Latest Questions and Correct Answers

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
02-05-2025
Written in
2024/2025

C191 Latest Questions and Correct Answers C191 Latest Questions and Correct Answers

Institution
C191
Course
C191










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C191
Course
C191

Document information

Uploaded on
May 2, 2025
Number of pages
26
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page 1



C191 Latest Questions and Correct
Answers
In the UNIX operating system, a domain is associated with the

Ans: user


The most common method used by attackers to breach
security is

Ans: masquerading


In MULTICS, the protection domains are organized in a

Ans: ring structure


A code segment that misuses its environment is called

Ans: a Trojan horse


In an access matrix, the ____ right allows a process to change
the entries in a row.

Ans: control


Worms ____

, Page 2


Ans: use the spawn mechanism to ravage system
performance / can shut down an entire network /
continue to grow as the Internet expands


The ____ implementation of an access table consists of sets
of ordered triples.

Ans: global table


A denial of service attack is ____.

Ans: aimed at disrupting legitimate use of a system


In capability lists, each object has a ____ to denote its type

Ans: tag


In a paired-password system, ____.

Ans: the computer supplies one part of a password and
the user enters the other part


Which of the following implementations of the access matrix
is a compromise between two other implementations listed
below?

Ans: lock-key

, Page 3


A ____ virus changes each time it is installed to avoid
detection by antivirus software.

Ans: polymorphic


In the reacquisition scheme for implementing the revocation
of capabilities, ____.

Ans: capabilities are periodically deleted from each
domain


____ is a symmetric stream cipher.

Ans: RC4


Which of the following is an advantage of compiler-based
enforcement of access control?

Ans: Access privileges are closely related to the
linguistic concept of a data type.


A ____ is a public key digitally signed by a trusted party.

Ans: digital certificate


Which of the following is a true statement regarding the
relative merits between access rights enforcement based
solely on a kernel, as opposed to enforcement provided
largely by a compiler?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ivie Southern New Hampshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
7 months
Number of followers
1
Documents
7102
Last sold
1 week ago

3.3

6 reviews

5
2
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions