Exam 7: Security Architecture and Design

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Implied addressing addresses the entire primary memory space.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

Which rating system uses a concept called a protection profile?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

C

Boundary Control Services are responsible for placing various components in security zones.

Free
(True/False)
5.0/5
(30)
Correct Answer:
Verified

True

Integrity is provided if the data cannot be read.

(True/False)
4.8/5
(39)

Which framework is a two-dimensional model that intersects communication interrogatives (what, why, where, and so on) with various viewpoints (planner owner, designer, and such)?

(Multiple Choice)
4.7/5
(30)

C1 is an evaluation level in which rating system?

(Multiple Choice)
4.8/5
(32)

Which book in the Rainbow series addresses network security?

(Multiple Choice)
4.8/5
(26)

Which if the following is a system component that enforces access controls on an object?

(Multiple Choice)
4.9/5
(34)

Availability describes what percentage of the time the resource or the date is available.

(True/False)
4.8/5
(45)

Which type accreditation evaluates an application or support system?

(Multiple Choice)
4.9/5
(34)

A Stakeholder is an individual with interests or concerns that should be considered.

(True/False)
4.7/5
(45)

An embedded system is a standalone piece of software.

(True/False)
4.9/5
(23)

Flash memory is a type RAM.

(True/False)
4.8/5
(34)

Which Bell-LaPadula rule says a subject cannot read data located at a higher security level than that possessed by the subject?

(Multiple Choice)
4.8/5
(34)

Confidentially is provided if the data cannot be read.

(True/False)
4.9/5
(39)

When a CPU gets an instruction from memory, the process is called fetching.

(True/False)
4.9/5
(29)

Which security mode allows two or more classification levels of information to be processed at the same time?

(Multiple Choice)
4.9/5
(40)

In asymmetric multiprocessing mode, a processor is dedicated to a specific process or application.

(True/False)
4.8/5
(28)

Which of the following occurs when someone has access to information at one level that allows them to infer information about another level?

(Multiple Choice)
4.9/5
(35)

Which of the following is sometimes called a backdoor?

(Multiple Choice)
4.8/5
(41)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)