Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

As a general rule, secure systems designers should use complex security mechanis

ID: 3874287 • Letter: A

Question

As a general rule, secure systems designers should use complex security mechanisms to prevent their systems being easily compromised.
    a. true
    b. false

A sandbox is a technique by which a downloaded program is executed is such a way that each of its instructions can be fully controlled. If an attempt is made to execute an instruction that has been forbidden by the host, execution of the program will be stopped.
    a. true
    b. false

In practice, access to any part of a distributed system is controlled by a special kind of reference monitor known as a firewall.
    a. true
    b. false

With distributed systems, the security environment consists of multiple administrative domains.
    a. true
    b. false

In the Reduced Interfaces for Secure System Components (RISSC) approach, any security-critical server will be placed on a separate machine isolated from end-user systems using low-level secure network interfaces.
    a. true
    b. false

Explanation / Answer

1)

a) true

explanation:

there are five secure system design by basic principle

Integrality

invariantness

unfication principle

Adequete principle

correctness principle

By intergrality priciple secure systems designers should use complex security mechanisms to prevent their systems being easily compromised.

2)

a)True

explanation:

Sandbox technique run the host instruction by Virtual Machine Host

So it terminate the process and the program will stop(or run out of the processs)

3)

a) TRUE

4)

a) true

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote