1) What is a security risk of allowing mobile code to execute on a target machin
ID: 3834348 • Letter: 1
Question
1) What is a security risk of allowing mobile code to execute on a target machine?
The time delay from when it is downloaded and executed could initiate an asynchronous attack.
It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.
Malware may be included in the downloaded code and infect the target machine.
It will contaminate files that contain computer code, especially .exe and .com
files.
2). Encrypting a message with a private key in an asymmetric system provides:
Proof of receipt.
Confidentiality
Proof of origin.
Message availability.
3). In which access control mechanism does the operating system determine the access
control permissions for subjects?
Role-based
Mandatory
Token-based
Discretionary
4). The security principle whose goal is to ensure that information is only modified by
those who have authority to change it is called:
Availability.
Integrity.
Confidentiality.
Authenticity.
The time delay from when it is downloaded and executed could initiate an asynchronous attack.
It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.
Malware may be included in the downloaded code and infect the target machine.
It will contaminate files that contain computer code, especially .exe and .com
files.
Explanation / Answer
2). Encrypting a message with a private key in an asymmetric system provides:
Confidentiality
4).The security principle whose goal is to ensure that information is only modified by
those who have authority to change it is called:
Integrity
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.