Você está na página 1de 3

Explique sobre o estouro de buffer baseado em pilha.

______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
2 O que um modelo de ameaas?
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
3 Qual objetivo do modelo de ameaas?
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
4 Informe como formado o processo de modelagem de ameaas.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
5 O que uma ACL?
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
6 O que compe uma ACL?
______________________________________________________________________
____________________________

______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
7 Como formado o processo para definio de boas ACLs?
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
8 Cite problemas que podem ser ocasionados com o uso de ACLs fracas.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
9 Informe e comente os componentes mais importantes de uma ACE.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
10 Alm das ACLs, existem outros mtodos para proteger recursos, cite-os.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________

Anhanguera Educacional
Taguatinga FACNET 11 Explique com suas palavras o que uma criptografia de
dados.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
12 Informe os principais efeitos de uso da criptografia.

______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
13 De acordo com o tipo de chave usada, os mtodos criptogrficos podem ser
subdivididos em duas grandes
categorias, quais so?
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
14 Diferencie a criptografia de chave simtrica e a de chaves assimtricas.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
15 Explique o que a funo hash.
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
______________________________________________________________________
____________________________
16 O que um certificado digital?
____________________________________

Você também pode gostar