The process of turning off unnecessary features in the system is known as
. Question 38 .
The process that screens individual IP packets based solely on the contents of the source and / or destination fields in the packet header is known as
. Question 39 .
According to the Trust Services Framework , the reliability principle of integrity is achieved when the system produces data that
. Question 40 .
Compatibility tests utilize a ( n ) ________, which is a list of authorized users , programs , and data files the users are authorized to access or manipulate .
. Question 41 .
Which of the following is not one of the three important factors determining the strength of any encryption system ?
. Question 42 .
Which of the following descriptions is not associated with symmetric encryption ?
. Question 43 .
An electronic document that certifies the identity of the owner of a particular public key .
. Question 44 .