Logomenu

Computer Security and Reliability Questions

Explore questions in the Computer Security and Reliability category that you can ask Spark.E!

What can happen if a user does not authenticate the system?

What is the advantage of giving read access to the password file only to privileged users?

Why do we have to be careful to consider all the costs for policy/procedure controls?

which company has recently had trouble with malware in ads within search results?

if an error occurs in a block of ciphertext on transmission using CBC, what effect is produced on the recovered plaintext blocks?

if you publish the digest of a message, how can someone check the integrity of that message?

you usually cannot sign a message you've already

What is confidentiality in terms of data access?

True/False: Availability is context-dependent

True/False: Confidentiality is easy to ensure

How to protect against data level threats?

True/False: Protocols ensure availability of resources for different users

Does GRE include any flow-control mechanisms?

The GRE header, together with the tunneling IP header, creates how many bytes of additional overhead for tunneled packets?

Which IP protocol is used to identify GRE packets?

Does GRE include any strong security mechanisms to protect its payload?

There are two primary methods for deploying remote access VPNs and they are...

Are VPN gateways responsible for encapsulating and encrypting outbound traffic for all traffic from a particular site?

There are two common HMAC algorithms and they are...

Do VPNs End hosts send and receive normal TCP/IP traffic through a VPN gateway?