In: Computer Science
Q1. Search online to find an example policy statement and show the five components of a security policy in the statement.
Q2. Describe the difference between DAC and MAC policies.
Q3. Explain the difference between Black-Box and White-Box testing. Use one specific example for each.
Q4. Discuss the advantages and disadvantages of dynamic analysis technique over static analysis techniques.
Q5. Explain the two extensions of RBAC model in two separate paragraphs. Discuss the advantage of each one.
Q6. What are types of tickets and servers used in Kerberos ? Why does Kerberos need them.