Which element must computer evidence have to be admissi…
Which element must computer evidence have to be admissible in court?
which security level is the first to require a system t…
According to the Orange Book, which security level is the first to require a system to support separate operator
and system administrator roles?
In Operations Security trusted paths provide:
In Operations Security trusted paths provide:
The deliberate planting of apparent flaws in a system f…
The deliberate planting of apparent flaws in a system for the purpose of detecting attempted penetrations or
confusing an intruder about which flaws to exploit is called:
Under the principle of culpable negligence, executives …
Under the principle of culpable negligence, executives can be held liable for losses that result from computer
system breaches if:
Which TCSEC (Orange Book) rating or level requires the …
Which TCSEC (Orange Book) rating or level requires the system to clearly identify functions of the security
administrator to perform security-related functions?
What critical step in forensic evidence have you forgotten?
You work in a police department forensics lab where you examine computers for evidence of crimes. Your work
is vital to the success of the prosecution of criminals.
One day you receive a laptop and are part of a two-man team responsible for examining it together. However, itis lunch time and after receiving the laptop you leave it on your desk and you both head out to lunch.
What critical step in forensic evidence have you forgotten?
Configuration Management is a requirement for the follo…
Configuration Management is a requirement for the following level(s) of the Orange Book?
Elements of this type of control may include counting d…
This type of control is used to ensure that transactions are properly entered into the system once. Elements of
this type of control may include counting data and time stamping it with the date it was entered or edited?
Which of the following Operation Security controls is i…
Which of the following Operation Security controls is intended to prevent unauthorized intruders from internally
or externally accessing the system, and to lower the amount and impact of unintentional errors that are entering
the system?