ISC Exam Questions

Which of the following specifies the behaviors of the DRM implementation and any applications that a

Which of the following specifies the behaviors of the DRM implementation and any applications
that are accessing the implementation?

A.
OS fingerprinting

B.
OTA provisioning

C.
Access control

D.
Compliance rule

Explanation:
The Compliance rule specifies the behaviors of the DRM implementation and any
applications that are accessing the implementation. The compliance rule specifies the following
elements: Definition of specific license rights Device requirements Revocation of license path or
Over- the- air provisioning is a mechanism to deploy MIDlet suites over a network. It is a method
of distributing MIDlet suites. MIDlet suite providers install their MIDlet suites on Web servers and
provide a hypertext link for downloading. A user can use this link to download the MIDlet suite
access control is a system, which enables an authority to control access to areas and resources in
a given physical facility, or computer-based information system. Access control system, within the
field of physical security, is generally seen as the second layer in the security of a physical

structure. It refers to all mechanisms that control visibility of screens, views, and data within Siebel
host sends special traffic on the external network interface of a computer to determine the
computer’s operating system. It is one of the primary steps taken by hackers in preparing an
attack.