click below
click below
Normal Size Small Size show me how
ECE437 Module 8
Flashcards for Module 8
| Question | Answer |
|---|---|
| The ___ implementation of an access table consists of sets of ordered triples. | Global table |
| In the UNIX operating system, a domain is associated with the ____. | user |
| Domains may share access rights | True |
| Worms... | [All of the Above] Use spawn to duplicate themselves, can bring down an entire network, uses system resources |
| A denial of service attack is... | Aimed at disrupting legitimate use of a system |
| A ____ virus changes each time it is installed to avoid detection by antivirus software. | polymorphic |
| In the UNIX operating system, a domain is associated with the ____. | user |
| A code segment that misuses its environment is called | a Trojan horse |
| When creating a MAC (Message Authentication Code), public-key encryption is used? | False |
| Suppose Bob wants to send Alice a digital signature for the message M. To create the digital signature... | Bob applies a hash function to M and then encrypts the result with his private key |
| ____ is a symmetric stream cipher. | RC4 |
| Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should... | encrypt the message with Alice's public key and send Alice the message. |
| An access matrix is generally dense. | False |