Examlex
Q3: _ implements a security policy that specifies
Q15: The Biba models deals with confidentiality and
Q16: In a relational database columns are referred
Q18: The firewall may be a single computer
Q18: The legal and ethical aspects of computer
Q23: A _ attack involves trying all possible
Q40: Misuse of the physical infrastructure includes vandalism,theft
Q41: There is a need for a continuum
Q42: _ code refers to programs that can
Q44: An IT security plan should include details