Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) What is a security risk of allowing mobile code to execute on a target machin

ID: 3834348 • Letter: 1

Question

1) What is a security risk of allowing mobile code to execute on a target machine?

The time delay from when it is downloaded and executed could initiate an asynchronous attack.

It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.

Malware may be included in the downloaded code and infect the target machine.

It will contaminate files that contain computer code, especially .exe and .com
files.

2). Encrypting a message with a private key in an asymmetric system provides:

Proof of receipt.

Confidentiality

Proof of origin.

Message availability.

3). In which access control mechanism does the operating system determine the access
control permissions for subjects?

Role-based

Mandatory

Token-based

Discretionary

4). The security principle whose goal is to ensure that information is only modified by
those who have authority to change it is called
:

Availability.

Integrity.

Confidentiality.

Authenticity.

The time delay from when it is downloaded and executed could initiate an asynchronous attack.

It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.

Malware may be included in the downloaded code and infect the target machine.

It will contaminate files that contain computer code, especially .exe and .com
files.

Explanation / Answer

2). Encrypting a message with a private key in an asymmetric system provides:

Confidentiality

4).The security principle whose goal is to ensure that information is only modified by
those who have authority to change it is called
:

Integrity