A. Zachman
B. SABSA
C. ISO 27000
D. TOGAF
B
A. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a fixed approach to current and future threats and also the needs of peripheral functions
B. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages new technology investments, it provides a flexible approach to current and future threats and also the needs of core functions
C. It represents a complex, short term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a flexible approach to current and future threats and also the needs of core functions.
D. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a flexible approach to current and future threats and also the needs of core functions
D
A. Threat modeling, covert channels, and data classification
B. Data classification, risk assessments, and covert channels
C. Risk assessments, covert channels, and threat modeling
D. Threat modeling, data classification, and risk assessments
D
A. ISO 15408
B. ISO 27001
C. ISO 9001
D. ISO 9146
B
A. Security kernel
B. Security policy
C. Security model
D. Security reference monitor
B
A. Multilevel lattice
B. State machine
C. Non-interference
D. Matrix-based
D
A. Biba-Integrity
B. Clark-Wilson
C. Brewer-Nash
D. Bell-LaPadula
D
A. Simple property
B. * (star) property
C. Invocation property
D. Strong * property
C
A. Brewer-Nash
B. Clark-Wilson
C. Bell-LaPadula
D. Lipner
A
A. Bell-LaPadula
B. Biba-Integrity
C. Chinese Wall
D. Graham-Denning
D
A. 15408
B. 27000
C. 9100
D. 27002
A
A. Protection Profiles
B. Security Target
C. Trusted Computing Base
D. Ring Protection
A
A. EAL 1
B. EAL 3
C. EAL 5
D. EAL 7
D
A. Certification
B. Accreditation
C. Validation
D. Verification
B
A. Initial
B. Managed
C. Defined
D. Optimizing
C
A. Threat/risk assessment
B. Penetration testing
C. Vulnerability assessment
D. Data classification
A
A. Storage
B. Boundary
C. Timing
D. Monitoring
A|C
A. The 3G/4G protocols are inherently insecure
B. Lower processing power
C. Hackers are targeting mobile devices
D. The lack of anti-virus software.
B
A. Typically installed by end-users and granted access to the supervisor state
B. Typically installed by administrators and granted access to user mode state
C. Typically installed by software without human interaction.
D. Integrated as part of the operating system.
A
A. Layering
B. Data hiding
C. Cryptographic protections
D. Abstraction
D
A. Encryption of data, Access Control, Steganography
B. Steganography, Access control, Nonrepudiation
C. Nonrepudiation, Steganography, Encryption of Data
D. Encryption of Data, Nonrepudiation, Access Control
D
A. Diffie-Hellman
B. Rijndael
C. Blowfish
D. SHA-256
A
A. A symmetric algorithm provides better access control.
B. A symmetric algorithm is a faster process.
C. A symmetric algorithm provides nonrepudiation of delivery.
D. A symmetric algorithm is more difficult to implement.
B
A. Send a digital signature of the message to the recipient
B. Encrypt the message with a symmetric algorithm and send it
C. Encrypt the message with a private key so the recipient can decrypt it with the corresponding public key
D. Create a checksum, append it to the message, encrypt the message, and then send to recipient
D