Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Why does compiled code pose more of a security risk than interpreted code?

A.

Because malicious code can be embedded in compiled code and be difficult to detect.

B.

If the executed compiled code fails, there is a chance it will fail insecurely.

C.

Because compilers are not reliable.

D.

There is no risk difference between interpreted code and compiled code.

Which of the following describes a logical form of separation used by secure computing systems?

A.

Processes use different levels of security for input and output devices.

B.

Processes are constrained so that each cannot access objects outside its permitted domain.

C.

Processes conceal data and computations to inhibit access by outside processes.

D.

Processes are granted access based on granularity of controlled objects.

What can best be described as a domain of trust that shares a single security policy and single management?

A.

The reference monitor

B.

A security domain

C.

The security kernel

D.

The security perimeter

A Security Kernel is defined as a strict implementation of a reference monitor mechanism responsible for enforcing a security policy. To be secure, the kernel must meet three basic conditions, what are they?

A.

Confidentiality, Integrity, and Availability

B.

Policy, mechanism, and assurance

C.

Isolation, layering, and abstraction

D.

Completeness, Isolation, and Verifiability

What can be defined as: It confirms that users’ needs have been met by the supplied solution ?

A.

Accreditation

B.

Certification

C.

Assurance

D.

Acceptance

Degaussing is used to clear data from all of the following medias except:

A.

Floppy Disks

B.

Read-Only Media

C.

Video Tapes

D.

Magnetic Hard Disks

What prevents a process from accessing another process' data?

A.

Memory segmentation

B.

Process isolation

C.

The reference monitor

D.

Data hiding

Which of the following best defines add-on security?

A.

Physical security complementing logical security measures.

B.

Protection mechanisms implemented as an integral part of an information system.

C.

Layer security.

D.

Protection mechanisms implemented after an information system has become operational.

A 'Pseudo flaw' is which of the following?

A.

An apparent loophole deliberately implanted in an operating system program as a trap for intruders.

B.

An omission when generating Psuedo-code.

C.

Used for testing for bounds violations in application programming.

D.

A normally generated page fault causing the system to halt.

Which of the following is NOT a technical control?

A.

Password and resource management

B.

Identification and authentication methods

C.

Monitoring for physical intrusion

D.

Intrusion Detection Systems

What is used to protect programs from all unauthorized modification or executional interference?

A.

A protection domain

B.

A security perimeter

C.

Security labels

D.

Abstraction

Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?

A.

Detailed design

B.

Implementation

C.

Product design

D.

Software plans and requirements

In what way could Java applets pose a security threat?

A.

Their transport can interrupt the secure distribution of World Wide Web pages over the Internet by removing SSL and S-HTTP

B.

Java interpreters do not provide the ability to limit system access that an applet could have on a client system.

C.

Executables from the Internet may attempt an intentional attack when they are downloaded on a client system.

D.

Java does not check the bytecode at runtime or provide other safety mechanisms for program isolation from the client system.

Which of the following determines that the product developed meets the projects goals?

A.

verification

B.

validation

C.

concurrence

D.

accuracy

Which of the following is NOT a proper component of Media Viability Controls?

A.

Storage

B.

Writing

C.

Handling

D.

Marking

Which of the following would be the best criterion to consider in determining the classification of an information asset?

A.

Value

B.

Age

C.

Useful life

D.

Personal association

The preliminary steps to security planning include all of the following EXCEPT which of the following?

A.

Establish objectives.

B.

List planning assumptions.

C.

Establish a security audit function.

D.

Determine alternate courses of action

What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?

A.

A fail safe system

B.

A fail soft system

C.

A fault-tolerant system

D.

A failover system

Which of the following is BEST defined as a physical control?

A.

Monitoring of system activity

B.

Fencing

C.

Identification and authentication methods

D.

Logical access control mechanisms

What is the most secure way to dispose of information on a CD-ROM?

A.

Sanitizing

B.

Physical damage

C.

Degaussing

D.

Physical destruction