The process of turning off unnecessary features in the system is known as
. Question 38.
The process that screens individual IP packets based solely on the contents of the source and / or destination fields in the packet header is known as
. Question 39.
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that
. Question 40.
Compatibility tests utilize a( n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.
. Question 41.
Which of the following is not one of the three important factors determining the strength of any encryption system?
. Question 42.
Which of the following descriptions is not associated with symmetric encryption?
. Question 43.
An electronic document that certifies the identity of the owner of a particular public key.
. Question 44.