Security Architecture and Design Flashcards
A holistic lifecycle for developing security architecture that begins with assessing business requirements and subsequently creating a chain of traceability through phases of strategy, concept, design, implementation and metrics is characteristic of which of the following frameworks? A. Zachman B. SABSA C. ISO 27000 D. TOGAF
B. SABSA
Which of the following component of ITIL's service portfolio primarily focused on translating designs into operational services through a project management standard? A. service strategy B. service design C. service transition D. service operations
C. service transition
Which of the following can best be used to capture detailed security requirements?
A. threat modeling, covert channels, data classification
B. data classification, risk assessments, covert channels
C. risk assessments, covert channels, and threat modeling
D. threat modeling, data classification, risk assessments
D. threat modeling, data classification, risk assessments
Which of the following security standards is internationally recognized as the standards for sound security practices and is focused on the standardization and certification of an organization's information security management system? A. ISO 15408 B. ISO 27001 C. ISO 9001 D. ISO 9146
B. ISO 27001
Which of the following describes the rules that need to be implemented to ensure that the security requirement are met? A. security kernel B. security policy C. security model D. security reference monitor
B. security policy
A two dimensional grouping of individual subjects into groups or roles and granting access to groups to objects is an example of which of the following types of models? A. multilevel lattice B. state machine C. non-interference D. matrix based
D. matrix based
Which of the following models ensures that a subject with a clearance level of secret has the ability to write only to objects classified as secret or top secret but is prevent from writing information classified as public? A. Biba-integrity B. clark-wilson C. brewer-nash D. bell-lapadula
D. bell-lapadula
Which of the following is unique to the biba-integrity model? A. simple property B. star property C. invocation property D. Strong star property
C. invocation property
Which of the following models is best considered in a shared data hosting environment so that the data of one customer is not disclosed to a competitor or other customers sharing that hosted environment? A. brewer-nash B. clark-wilson C. bell-lapadula D. lipner
A. brewer-nash
Which of the following security models is primarily concerned with how the subjects and objects are created and how subjects are assigned rights or privileges? A. bell-lapdula B. biba-integrity C. chinese wall D. graham-denning
D. graham-denning
Which of the following ISO standards provides the evaluation criteria that can be used to evaluate security requirements of different products with different functions? A. 15408 B. 27000 C. 9100 D. 27002
A. 15408
In the common criteria, the common set of functional and assurance requirements for a category of vendor products deployed in a particular type of environment are known as A. protection profiles B. security target C. trusted computing base D. ring protection
A. protection profiles
Which of the following evaluation assurance level that is formally verified, designed and tested is expected for a high risk situation? A. EAL 1 B. EAL 3 C. EAL 5 D. EAL 7
D. EAL 7
Formal acceptance of an evaluated system by management is known as A. certification B. accreditation C. validation D. verification
B. accreditation
Which stage of the capability maturity model is characterized by having organizational processes that are proactive? A. initial B. managed C. defined D. optimizing
C. defined
Which of the following best provides a method of quantifying risks associated with information technology when validating the abilities of new security controls and countermeasures to address the identified risks? A. threat/risk assessment B. penetration testing C. vulnerability assessment D. data classification
A. threat/risk assessment
The use of proxies to protect more trusted assets from less sensitive ones is an example of which of the following types of security services? A. access control B. boundary control C. integrity D. audit and monitoring
B. boundary control
Which of the following is the main reason for security concerns in mobile computing devices?
A. the 3G protocol is inherently insecure
B. lower processing power
C. hackers are targeting mobile computing devices
D. lack of anti-virus software
B. lower processing power
In decentralized environments device drivers that enable the OS to control and communicate with hardware need to be securely designed, developed and deployed because they are
A. typically installed by end users and granted access to the supervisor state
B. typically installed by administrators and granted access to user mode state
C. typically installed by software without human interaction
D. integrated as part of the operating system
A. typically installed by end users and granted access to the supervisor state
A system administrator grants rights to a group of individuals called accounting instead of granting rights to each individual. This is an example of which of the following security mechanisms? A. layering B. data hiding C. cryptographic protections D. abstraction
D. abstraction
Which of the following are the evaluation criteria most in use today for rating IDS systems? A. ITSEC B. Common Criteria C. Red Book D. Orange Book
B. Common Criteria