Search Header Logo

Domain. 3 - Security Engineering - Quiz 1

Authored by gopi venketesan

Professional Development

Professional Development

Used 2+ times

Domain. 3 - Security Engineering - Quiz 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which organization began developing the Common Criteria (CC) standard in 1990?

IEEE

ISC2

ISO

NIST

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?

Biba

BellLa Padula

Trusted Computer System

Clark-Wilson

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ted has been working with one of the contract programmers on a web-based application and comes to you with a question: What is a thread? What do you tell him?

A thread is a set of instructions that the computer understands and processes in a virtual machine.

A thread is a single sequential flow of control within a program.

A thread is a highly privileged routine that is executed within a computer system.

A thread is a program in execution that can communi- cate only with its controlling process.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your boss has questions about ports and protocols that must be allowed through the firewall. He is concerned about egress from inside the firewall to outside, as well as ingress from outside to inside. He also wants to know how attackers may use resources in a way not intended, or a possible attack in which a resource may be modulated to signal unauthorized information. Which of the following best describes this possible method of attack?

Data Pipe

Backdoor

Tunneling

Covert Channel

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when a class of objects is assigned permissions?

Attribute

Fault tolerance

Abstraction

Security model

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Bell-LaPadula model was developed to protect which of the following?

Availability

Integrity

Confidentiality

Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Dana has been studying computer system design and has a question: What is another name for a PLC?

RAM

Small computer typically used in automation

Scalar processor

Superscalar processor

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?