State a security requirement that is not realistic. State a security requirement that is not verifiable. State two security requirements that are inconsistent.
What will be an ideal response?
Not realistic: Zero downtime, no confidentiality loss, perfect security.
Not verifiable: Reject all and only the potentially harmful traffic. Maximum protection of privacy.
Inconsistent: Full auditing of users’ actions; cannot be used to harm users’ privacy.
You might also like to view...
The ________ option starts an animation sequence for the selected slide element directly following the completion of the preceding animation
A) Before Next B) Follow Previous C) Prior to Next D) After Previous
Match the following terms to their meanings:
I. Data series II. Data point III. Legend IV. Cell reference V. Data marker A. identifies the patterns or colors assigned to the data series B. letter and number of intersecting column and row C. an individual pie slice on a pie chart D. a value that originates in a cell E. related data points