Security Engineering

Security Engineering

Professional Development

63 Qs

quiz-placeholder

Similar activities

Brand and Sales process

Brand and Sales process

Professional Development

60 Qs

ADX 201 Random 2

ADX 201 Random 2

Professional Development

64 Qs

ADX 201 Quiz 3

ADX 201 Quiz 3

Professional Development

65 Qs

Reviewer

Reviewer

Professional Development

60 Qs

Test Your Knowledge_Hunting_AS_EN

Test Your Knowledge_Hunting_AS_EN

Professional Development

64 Qs

SFDC Admin Practice Test 1

SFDC Admin Practice Test 1

Professional Development

60 Qs

ADX 201 Quiz 1

ADX 201 Quiz 1

Professional Development

65 Qs

ADX 201 Random 3

ADX 201 Random 3

Professional Development

65 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Other

Professional Development

Hard

Created by

Shamsheer Khan

Used 1+ times

FREE Resource

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC provides levels of security that are classified in a hierarchical manner. Each level has a corresponding set of security requirements that must be met. To which of the following does Level A correspond?
Mandatory protection
Required protection
Verified protection
Validated protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC offers numbered divisions of security that can occur in each category. With this in mind, which of the following represents the highest level of security?
B2
D2
B1
D1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jim has been asked to assist with a security evaluation. He has heard other members of the teams talking about ‘‘TCB.’’ What does TCB stand for?
Taking care of business
Total computer base
Trusted computer base
Total communication bandwidth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the valid states in which a CPU can operate?
Processor
Supervisor
Problem
Wait

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization began developing the Common Criteria (CC) standard in 1990?
IEEE
ISC2
ISO
NIST

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?
Biba
Bell-LaPadula
Trusted Computer System
Clark-Wilson

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your CISSP study group is reviewing the Security Engineering domain in preparation for the exam. One of the members has a question. Which of the following is not one of the requirements for memory management?
Processing
Sharing
Protection
Relocation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?