Exam 13: Security Standards
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Which is a security model originally designed in anticipation of United States military applications?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
To what does the "Discretionary Protection" category refer?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Which is a security model using the concepts of subjects,objects,and programs?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
What level of protection is available in IBM OS\400,Windows XP,and Novell Netware?
(Multiple Choice)
4.8/5
(38)
The DoD security categories range from minimal protection to ____________ protection.
(Short Answer)
4.7/5
(30)
The ____________ is a collection of color-coded books on information security.
(Short Answer)
4.7/5
(37)
The purpose of the ____________ Model is to prevent information flow that can cause conflict of interest.
(Short Answer)
4.7/5
(38)
Although the ____________ Model is similar to the Bell-LaPadula Model,it also has additional applications.
(Short Answer)
5.0/5
(40)
Who publishes a series of color-coded books on information security?
(Multiple Choice)
4.8/5
(36)
What is the common name given to one of a series of color-coded books that outlines criteria for rating various operating systems?
(Multiple Choice)
4.8/5
(29)
Which variation of the Unix operating system provides the higher security level?
(Multiple Choice)
4.9/5
(42)
What division designation is given to a system with a classification so low it is not rated?
(Multiple Choice)
4.8/5
(44)
The ____________ is a perhaps the best known of a series of color-coded books on information security.
(Short Answer)
4.9/5
(34)
What is the purpose of the concept of "separation of duties" as used in some security models?
(Multiple Choice)
4.8/5
(35)
Operating systems such as HP-UX BLS,Cray Research Trusted Unicos 8.0,and Digital SEVMS all are within which security division?
(Multiple Choice)
4.7/5
(30)
The ____________ is the result of combining three existing standards.
(Short Answer)
4.8/5
(33)
One security division contains ____________ categories so named because such operating systems have yet to be developed.
(Short Answer)
4.7/5
(41)
Showing 1 - 20 of 21
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)