Exam 7: Security Architecture and Design
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
Implied addressing addresses the entire primary memory space.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
Which rating system uses a concept called a protection profile?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
Boundary Control Services are responsible for placing various components in security zones.
Free
(True/False)
5.0/5
(30)
Correct Answer:
True
Which framework is a two-dimensional model that intersects communication interrogatives (what, why, where, and so on) with various viewpoints (planner owner, designer, and such)?
(Multiple Choice)
4.7/5
(30)
Which book in the Rainbow series addresses network security?
(Multiple Choice)
4.8/5
(26)
Which if the following is a system component that enforces access controls on an object?
(Multiple Choice)
4.9/5
(34)
Availability describes what percentage of the time the resource or the date is available.
(True/False)
4.8/5
(45)
Which type accreditation evaluates an application or support system?
(Multiple Choice)
4.9/5
(34)
A Stakeholder is an individual with interests or concerns that should be considered.
(True/False)
4.7/5
(45)
Which Bell-LaPadula rule says a subject cannot read data located at a higher security level than that possessed by the subject?
(Multiple Choice)
4.8/5
(34)
When a CPU gets an instruction from memory, the process is called fetching.
(True/False)
4.9/5
(29)
Which security mode allows two or more classification levels of information to be processed at the same time?
(Multiple Choice)
4.9/5
(40)
In asymmetric multiprocessing mode, a processor is dedicated to a specific process or application.
(True/False)
4.8/5
(28)
Which of the following occurs when someone has access to information at one level that allows them to infer information about another level?
(Multiple Choice)
4.9/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)