Deck 7: Security Architecture and Design

Full screen (f)
exit full mode
Question
Confidentially is provided if the data cannot be read.
Use Space or
up arrow
down arrow
to flip the card.
Question
Integrity is provided if the data cannot be read.
Question
Availability describes what percentage of the time the resource or the date is available.
Question
A Stakeholder is an individual with interests or concerns that should be considered.
Question
An embedded system is a standalone piece of software.
Question
Boundary Control Services are responsible for placing various components in security zones.
Question
When a CPU gets an instruction from memory, the process is called fetching.
Question
Flash memory is a type RAM.
Question
Implied addressing addresses the entire primary memory space.
Question
In asymmetric multiprocessing mode, a processor is dedicated to a specific process or application.
Question
Which if the following is a system component that enforces access controls on an object?

A) Security Perimeter
B) Reference Monitor
C) Security Kernel
D) TCB
Question
Which framework is a two-dimensional model that intersects communication interrogatives (what, why, where, and so on) with various viewpoints (planner owner, designer, and such)?

A) Zachmann
B) TOGAF
C) ITIL
D) ISO/IEC 27000 Series
Question
Which of the following occurs when someone has access to information at one level that allows them to infer information about another level?

A) Polymorphism
B) Inference
C) Contamination
D) Escalation
Question
Which Bell-LaPadula rule says a subject cannot read data located at a higher security level than that possessed by the subject?

A) Simple security rule
B) *- property rule
C) Strong star property rule
D) Weak star property rule
Question
Which security mode allows two or more classification levels of information to be processed at the same time?

A) Dedicated
B) System High
C) Compartmented
D) Multilevel
Question
Which book in the Rainbow series addresses network security?

A) Red Book
B) Orange Book
C) Beige Book
D) Green Book
Question
C1 is an evaluation level in which rating system?

A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Question
Which rating system uses a concept called a protection profile?

A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Question
Which type accreditation evaluates an application or support system?

A) Type accreditation
B) System accreditation
C) Site accreditation
D) Simple accreditation
Question
Which of the following is sometimes called a backdoor?

A) Maintenance hook
B) Padded cell
C) SAML
D) Reference monitor
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Security Architecture and Design
1
Confidentially is provided if the data cannot be read.
True
2
Integrity is provided if the data cannot be read.
False
3
Availability describes what percentage of the time the resource or the date is available.
True
4
A Stakeholder is an individual with interests or concerns that should be considered.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
An embedded system is a standalone piece of software.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Boundary Control Services are responsible for placing various components in security zones.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
When a CPU gets an instruction from memory, the process is called fetching.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Flash memory is a type RAM.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Implied addressing addresses the entire primary memory space.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
In asymmetric multiprocessing mode, a processor is dedicated to a specific process or application.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which if the following is a system component that enforces access controls on an object?

A) Security Perimeter
B) Reference Monitor
C) Security Kernel
D) TCB
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which framework is a two-dimensional model that intersects communication interrogatives (what, why, where, and so on) with various viewpoints (planner owner, designer, and such)?

A) Zachmann
B) TOGAF
C) ITIL
D) ISO/IEC 27000 Series
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following occurs when someone has access to information at one level that allows them to infer information about another level?

A) Polymorphism
B) Inference
C) Contamination
D) Escalation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which Bell-LaPadula rule says a subject cannot read data located at a higher security level than that possessed by the subject?

A) Simple security rule
B) *- property rule
C) Strong star property rule
D) Weak star property rule
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which security mode allows two or more classification levels of information to be processed at the same time?

A) Dedicated
B) System High
C) Compartmented
D) Multilevel
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which book in the Rainbow series addresses network security?

A) Red Book
B) Orange Book
C) Beige Book
D) Green Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
C1 is an evaluation level in which rating system?

A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which rating system uses a concept called a protection profile?

A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which type accreditation evaluates an application or support system?

A) Type accreditation
B) System accreditation
C) Site accreditation
D) Simple accreditation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is sometimes called a backdoor?

A) Maintenance hook
B) Padded cell
C) SAML
D) Reference monitor
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.