Deck 7: Security Architecture and Design
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 7: Security Architecture and Design
1
Confidentially is provided if the data cannot be read.
True
2
Integrity is provided if the data cannot be read.
False
3
Availability describes what percentage of the time the resource or the date is available.
True
4
A Stakeholder is an individual with interests or concerns that should be considered.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
An embedded system is a standalone piece of software.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Boundary Control Services are responsible for placing various components in security zones.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
When a CPU gets an instruction from memory, the process is called fetching.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Flash memory is a type RAM.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Implied addressing addresses the entire primary memory space.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
In asymmetric multiprocessing mode, a processor is dedicated to a specific process or application.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which if the following is a system component that enforces access controls on an object?
A) Security Perimeter
B) Reference Monitor
C) Security Kernel
D) TCB
A) Security Perimeter
B) Reference Monitor
C) Security Kernel
D) TCB
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which framework is a two-dimensional model that intersects communication interrogatives (what, why, where, and so on) with various viewpoints (planner owner, designer, and such)?
A) Zachmann
B) TOGAF
C) ITIL
D) ISO/IEC 27000 Series
A) Zachmann
B) TOGAF
C) ITIL
D) ISO/IEC 27000 Series
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following occurs when someone has access to information at one level that allows them to infer information about another level?
A) Polymorphism
B) Inference
C) Contamination
D) Escalation
A) Polymorphism
B) Inference
C) Contamination
D) Escalation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which Bell-LaPadula rule says a subject cannot read data located at a higher security level than that possessed by the subject?
A) Simple security rule
B) *- property rule
C) Strong star property rule
D) Weak star property rule
A) Simple security rule
B) *- property rule
C) Strong star property rule
D) Weak star property rule
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which security mode allows two or more classification levels of information to be processed at the same time?
A) Dedicated
B) System High
C) Compartmented
D) Multilevel
A) Dedicated
B) System High
C) Compartmented
D) Multilevel
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which book in the Rainbow series addresses network security?
A) Red Book
B) Orange Book
C) Beige Book
D) Green Book
A) Red Book
B) Orange Book
C) Beige Book
D) Green Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
C1 is an evaluation level in which rating system?
A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which rating system uses a concept called a protection profile?
A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
A) TSEC
B) ITSEC
C) Common Criteria
D) Red Book
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which type accreditation evaluates an application or support system?
A) Type accreditation
B) System accreditation
C) Site accreditation
D) Simple accreditation
A) Type accreditation
B) System accreditation
C) Site accreditation
D) Simple accreditation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is sometimes called a backdoor?
A) Maintenance hook
B) Padded cell
C) SAML
D) Reference monitor
A) Maintenance hook
B) Padded cell
C) SAML
D) Reference monitor
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck