*****DOUBLE JEOPARDY******** Who developed theoretical computer science, providing a formalisation of the concepts of algorithm and computation.
This concentrates access control in one logical point for a system or organization.
What is centralized access control?
These are the seven layers of the OSI Model
What are Physical, Data Link, Network, Transport, Session, Presentation, Application?
This is the single point of failure in Kerberos.
What is the key distribution center?
_____ uses a three-way handshake to establish a reliable connection. The connection is full duplex, and both sides _____ and _____ each other.
What are TCP, synchronize, and acknowledge?
This type of cracking attack will always be successful.
What is brute force?
This connects network nodes in a string--each node inspects the data as it passes along.
What is a bus?
Server A trusts server B. Server B trusts Server C. Server A therefore trusts server C. This term describes the trust relationship.
What is transitive trust?
This is described by IEEE standard 802.15 and it is a Personal Area Network wireless technology.
What is Bluetooth?
*****DOUBLE JEOPADRY ********
The first Network Intrusion Detection System (Network IDS), was designed and prototyped in the Computer Security Laboratory at the University of California, Davis, in 1989
What is Network Security Monitor (NSM).