Domain 4 Flashcards

1
Q

Which of the following is NOT a recommended consideration pertaining to application controls?

a) Potential risk
b) End-user opinion
c) Available controls
d) Environment type

A

End-user opinion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of environment has everything organized, controlled and performed from one location?

a) Decentralized
b) Distributed
c) Centralized
d) Compartmentalized

A

Centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of environment has multiple independent locations with little or no communications between the entities?

a) Centralized
b) Decentralized
c) Distributed
d) Compartmentalized

A

Decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the context of Object Oriented Systems, which of the following best describes an object?

a) A function or set of functions accessible only through its Application Program Interfaces (API)
b) A ‘black box’ that receives and sends messages
c) A code module that publishes both its code and data
d) A code subroutine that contains both code and data

A

A ‘black box’ that receives and sends messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of environment has communication and coordination between multiple locations?

a) Distributed
b) Centralized
c) Decentralized
d) Compartmentalized

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a mode of operation?

a) System High Mode
b) Compartment Mode
c) System Low Mode
d) Multi-level Secure Mode

A

System Low Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following modes is relatively simple and can be implemented with most operating systems?

a) System High Mode
b) Compartment Mode
c) Security Mode
d) Decompartment Mode

A

System High Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the method ActiveX relies on for security?

a) NTLM
b) Symmetrical encryption
c) Digital signatures
d) Sand-boxing

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main reason to consider security in the change control process?

a) To ensure that changes are securely recoded, tested and documented
b) To ensure that id, control and configuration audit is performed in a secure manner
c) To ensure that release, archiving and acceptance testing is performed securely
d) To ensure that security mechanisms are not negatively impacted by the proposed changes

A

To ensure that security mechanisms are not negatively impacted by the proposed changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At which critical step in the development process does the project manager expect to see the security risks defined?

a) Design analysis
b) System design specifications
c) Project initiation
d) Installation

A

Project initiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the most commonly exploited security vulnerabilities - buffer overflows - are addressed in which phase of the development process?

a) System design specification
b) Design analysis
c) Operation and maintenance
d) Programming and testing

A

Programming and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main concern with simply deleting files during the destruction phase of the development process?

a) There is no concern.
b) Deleted data can still be extracted from hard drives.
c) Deleted data still uses up a small portion of the capacity of the hard drive.
d) Ease dropping

A

Deleted data can still be extracted from hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Requiring a biometric fingerprint to enter a server room, followed by a username and password at the system console, followed by a pin to access the application, best represents which operational control?

a) Least privilege
b) Continuity of operations
c) Layered defense
d) Separation of duties

A

Layered defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which software development model has unique, discrete, sequential phases?

a) Spiral model
b) Top-down model
c) Waterfall model
d) Bottom-up model

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which mode of operation is difficult to implement and cannot be done with most operating systems?

a) Client/Server Mode
b) Compartment Mode
c) System High Mode
d) System Low Mode

A

Compartment Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following systems can be thought of as a group of independent units that can be requested to perform certain operations or exhibit specific behaviors?

a) Role-Based System
b) Object-Oriented System
c) Access Control System
d) Rapid Prototyping System

A

Object-Oriented System

17
Q

Which of the following defines an industry standard that enables programs written in different languages and using different platforms and operating systems to interface and communicate?

a) COBRA
b) CORBA
c) BOA
d) DCOM

A

CORBA

18
Q

There are three commonly used application development methodologies. Which of the following are those three methodologies?

a) RAIN, RAD, and RAT
b) Traditional, modern, and hybrid
c) Open source, closed source, and proprietary
d) Waterfall, spiral, and RAD

A

Waterfall, spiral, and RAD

19
Q

What are the characteristics of the Waterfall methodology of application development?

a) The project is divided into sequential stages, each with specific milestones
b) The phases of the project seamlessly flow from one into the next
c) While the project’s overall flow is forward, sub-tasks called eddies are spun off as needed
d) As design specifications evolve the project is able to adjust and flow forward

A

The project is divided into sequential stages, each with specific milestones

20
Q

What is the main factor that drives the spiral model of application development?

a) Risk
b) Cost
c) Performance
d) Availability

A

Risk

21
Q

What is the fundamental characteristic of the Rapid Application Development (RAD) model of application development?

a) Applications are developed that run very fast
b) 75% of all applications are developed this way
c) Applications have 25% more functionality
d) Applications are developed very quickly

A

Applications are developed very quickly

22
Q

What is the basic function of output controls?

a) That output is complete and accurate
b) Protection against unauthorized or accidental output of sensitive data
c) Insure that only those who are authorized have access to output
d) To maintain audit trails that trace back to the input data

A

Insure that only those who are authorized have access to output

23
Q

What function does a reference monitor perform?

a) Maintains the referential integrity of sensitive data
b) Monitors all references to sensitive data
c) Implements the Security Kernel
d) Validation of every single access request

A

Validation of every single access request

24
Q

What principle is violated when developers review implementation details?

a) Non-disclosure agreement
b) Confidentiality
c) Separation of duties
d) The principle of least privilege

A

Separation of duties

25
Q

What principle can be described as providing users with the minimum level of privilege required to complete a task?

a) Sand-boxing
b) Fixed function authorization
c) The principle of least privilege
d) Separation of duties

A

The principle of least privilege

26
Q

What term is used to describe a structured approach to documenting and approving changes to systems?

a) Operations management
b) Change control
c) Systems life cycle management
d) Segregation of duties

A

Change control

27
Q

What is the name of the application development model in which you start with the lower level details, bundled them into higher level components and finally into a production system?

a) Bottom-up model
b) Object-Oriented model
c) Spiral-up model
d) Component-mode model

A

Bottom-up model

28
Q

What type of software program operates as an agent on behalf of a user or another program?

a) Bots
b) Applets
c) Processes
d) Bytecode

A

Bots

29
Q

What is one of the most useful ways of addressing the Availability requirement of the CIA definition of security?

a) Memorandums of Agreement
b) Software life cycle management
c) Operational integrity procedures
d) Service Level Agreements

A

Service Level Agreements

30
Q

What is it that allows Java to be a cross platform programming language?

a) Java is executed within a virtual sandbox which is processor independent
b) The Java Virtual Machine (JVM) converts the bytecode into machine language for that CPU
c) Java applets are compiled into the bytecode specifically for the requesting processor
d) The Java Virtual Machine (JVM) is compiled in processor independent bytecode

A

The Java Virtual Machine (JVM) converts the bytecode into machine language for that CPU