Professional Documents
Culture Documents
I.
INTRODUCTION
LITERATURE REVIEW
METHODOLOGY
DMZ
DESCRIPTION
Link
Encryption
Scenario Name
Description
Patches
DMZ
Link Encrypt
SSL/TLS
Scenario
Questions
Questions
Patches
A.
B.
C.
D.
Hotfixes
Patches
Updates
BIOS updates
A. Based on
vulnerability report
obtained from scan
B. Alarm produced
C. Admin recognize
the vulnerable
systems just by
viewing
D. All of the above
E. None of these
SSL/TLS
Rosa is a consumer of
Company ABC. Rosa
wants to buy some products
from that company. For
that she uses the web site of
ABC,
www.abccompany.com.
How can she trust that
companys site?
A. Rosa confidence she is
interacting with a
known web site. SSL
gives confidence that
she is interacting with
ABC.
B. Required Rosa to
install a ABC root
C. Prevents
hackers
from
masquerading as
Rosa
D. All of the above
E.
No idea
Mandatory
Access
Control
V.
Unclassified
Controlled
Confidential
Secret
RESULT ANALYSIS
EG2
EG1
Mean
SD
68.5
2.07
10
30.2
12.17
10
t- value
df
p-value
9.8091
9.519
1.381e06
VI.
[9]
[10]
[11]
[12]
[13]
[14]
[15]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]