Domain. 3 - Security Engineering - Quiz 1

Domain. 3 - Security Engineering - Quiz 1

Professional Development

15 Qs

quiz-placeholder

Similar activities

09 Types of Fastener

09 Types of Fastener

Professional Development

20 Qs

Predict the output

Predict the output

Professional Development

17 Qs

IoT security and trust Quiz III

IoT security and trust Quiz III

Professional Development

10 Qs

cnc turning3

cnc turning3

Professional Development

10 Qs

SWOT Analysis

SWOT Analysis

Professional Development

10 Qs

physiology

physiology

Professional Development

11 Qs

METROLOGY

METROLOGY

Professional Development

10 Qs

Going to the Dentist

Going to the Dentist

Professional Development

18 Qs

Domain. 3 - Security Engineering - Quiz 1

Domain. 3 - Security Engineering - Quiz 1

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

gopi venketesan

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which organization began developing the Common Criteria (CC) standard in 1990?

IEEE

ISC2

ISO

NIST

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?

Biba

BellLa Padula

Trusted Computer System

Clark-Wilson

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ted has been working with one of the contract programmers on a web-based application and comes to you with a question: What is a thread? What do you tell him?

A thread is a set of instructions that the computer understands and processes in a virtual machine.

A thread is a single sequential flow of control within a program.

A thread is a highly privileged routine that is executed within a computer system.

A thread is a program in execution that can communi- cate only with its controlling process.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your boss has questions about ports and protocols that must be allowed through the firewall. He is concerned about egress from inside the firewall to outside, as well as ingress from outside to inside. He also wants to know how attackers may use resources in a way not intended, or a possible attack in which a resource may be modulated to signal unauthorized information. Which of the following best describes this possible method of attack?

Data Pipe

Backdoor

Tunneling

Covert Channel

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when a class of objects is assigned permissions?

Attribute

Fault tolerance

Abstraction

Security model

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Bell-LaPadula model was developed to protect which of the following?

Availability

Integrity

Confidentiality

Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Dana has been studying computer system design and has a question: What is another name for a PLC?

RAM

Small computer typically used in automation

Scalar processor

Superscalar processor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Professional Development