CIS 333 All Assignments CIS 333 All Assignments | Page 28
•
Question 79
A _____________ is a flaw or weakness in a system’s security procedures, design,
implementation, or internal controls.
•
Question 80
Forensics and incident response are examples of ___________ controls.
•
Question 81
What name is given to an encryption cipher that is a product cipher with a 56-bit key
consisting of 16 iterations of substitution and transformation?