security policies II Flashcards

1
Q

___ is documentation that details the security requirements that are specific to certain customer needs

A

Protection Profile (PP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the four mode used in protection profile are

A

dedicated security
system high
compartmentalized
multilevel secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ mode requires all users to have formal, need-to-know clearance to access information which exists within a system

A

dedicated security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ mode requires that the system and peripheral are classified and protected to the level of classification assigned to the most highly classified object which resides on the system

A

system high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ mode requires users to meet certain security criteria and have a predetermined access level and a valid need to know some portion of the information on the system.

A

compartmentalized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is the only mode that allows for multiple levels of classified data to reside within the same system.

A

Multilevel Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ are descriptions of the measures taken during development and evaluation of the product to assure compliance with the claimed security functionality.

A

security assurance requirements (SAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ is the organization that accredits testing laboratories.

A

designated approval authority (DAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ is the numerical rating describing the depth and rigor of an evaluation.

A

•Evaluation Assurance Level (EAL) is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a product that was not tested or did not meet the evaluation criteria for any other level

A

EAL 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ focuses on security during the design and development of the product, and requires examination of the low-level design of specific modules

A

EAL 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ requires independently-verified white box testing and careful design that minimizes complexity.

A

EAL 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ deploys rigorous engineering practices with some specialized security practices during the development

A

EAL 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ requires an independent examination of the development process and product to ensure that it was designed and produced using sound development practices

A

EAL 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ evaluates the product against its own documentation and typically does not require cooperation from the product developer.

A

EAL 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ requires some cooperation from the developer for assurance testing

17
Q

_______ ensures that the system meets all the security and performance requirements specified for the system

A

acceptance

18
Q

________ is the technical evaluation of security mechanisms in a system and their conformance to the desired security standard.

A

certification

19
Q

_______ is management’s acceptance of the product’s overall security certification as tested by the third party testing entity.

A

accreditation

20
Q

________ describes the use of evidence in several stages, including collection, use in court, and eventual return to the owner

A

evidence life cycle

21
Q

To ensure that evidence is admissible in court, you must be able to provide

A

chain of custody

22
Q

_____ evidence includes original, authentic objects.

23
Q

_______ evidence is information that supports another fact or detail.

A

corroborative

24
Q

_________ evidence is obtained from a source other than personal, firsthand knowledge

25
in this stage, the evidence is properly marked as evidence at the time it is found
collection and identification
26
in this stage, evidence should be only analyzed by trained specialists
preservation and analysis
27
in this stage, the utmost care must be taken to store and preserve evidence
storage
28
in this stage, evidence needs to be protected during all stages of transportation.
transportation and processing
29
in this stage, all evidence needs to have been submitted to the court and deemed admissible before it is presented during trial.
presentation in court
30
in this stage, all evidence should be returned to the original owner after the case is completely settled, with exclusion of some types of evidence, such as drugs or drug paraphernalia
return to owner