Get this Solved Assignment on advanced cybersecurity strategies.
Emma Taylor
Contributor
4.3
44
6 months ago
Preview (2 of 3 Pages)
100%
Purchase to unlock
Page 1
Loading page ...
CIS3360: Security in ComputingHomework 11. (55 points) Knowledge-based Question:a. What are the four criteria to judge whether or not biometrics are suitable for identification?What criteria does the biometric ‘weight’ violate (which makes itunsuitable for identification)?The four criteria to judge whether or not biometrics are suitable for identification are:1.Comfort2.Accuracy3.Availability4.costsCosts is the criteria which is unsuitable using biometric because there are other identificationsprocesses which are cheap but biometric is expensive and it needs expensive devices toevaluate identification.b. In computer’s memory, when stack grows, does the address of the top of stack increase ordecrease?In computer’s memory, when stack grows, the address of the top of stack decreases.c. What is a ‘page fault’? Why could page fault greatly reduce computing performance?When the page requested by a program is not available in the memory, it is called as a pagefault. Since it does nothing else and keeps finding the page the speed of computer slows down.d. What are the two types of virtual machines? What type of VM does Java VM belongs to?What type of VM does VMware belongs to?The two types of VM are:System virtual Machines and process virtual machines.System VM belongs to VMware whereas Process VM belongs to JavaVMe. What are mail ‘open relay’? Why can it be used by spammer to send out spam email?Mail open relay are the mail servers that allow anyone to send emails through them to anydestination.It can be used by spammers to send out spam emails because thousand evenmillions emails can be sent though them in short time.f. What does ‘Non-executable stackmemory’ mean? Why can some programs not run when thisoption is enabled?Non executable stack memory is a memory policy on the stack memory region that disallowsexecution from the stack. When this option is enabledcertain memory is marked as not forexecutable code. Viruses that attempt to insert and execute code from non-executablememory locations are intercepted and an exception is raised resulting some programs not torun.
Page 2
Preview Mode
This document has 3 pages. Sign in to access the full document!