Which one of the following statements is untrue?
Which one of the following statements is untrue?
Which task below would not belong on the list?
Mikes company has just been hired to do a one-time contract certification of a newly-implemented network center for a small dispatching company. As part of the contract, Mike includes a checklist of the tasks his team will perform during the certification. Which task below would not belong on the list?
Which evaluation program would be most suited for this task?
Katie has been appointed project manager of a new build-out on the 5th floor. Along with the facilities, she is responsible for selecting new hardware across the board. Her first task is to choose border routers to use on the Extranet platform. Which evaluation program would be most suited for this task?
which three principles?
The Trusted Computer Security Evaluation Criteria (TCSEC) is based on which three principles?
Containing subjects and objects and keeping them separate from one another for security reasons is known as:
Containing subjects and objects and keeping them separate from one another for security reasons is known as:
This method of joining a subject to an object is referred to as:
A security measure has recently been put into place within the accounting department. All users within a specified clearance level have been permanently tied to a database with an equal classification level. This method of joining a subject to an object is referred to as:
Which of the following are proper characteristics of a software process that runs within an operating system?
Which of the following are proper characteristics of a software process that runs within an operating system?
i.Set of instructions
ii. Assigned resources
iii. Loaded in memory
iv. Application programming interfaces
What is the term that describes Leos activities?
Because of increased security concerns, Leos IT staff begins taking aggressive steps to increase protection in their organization. Some of these steps include:
sandbox access controls, stronger network interfaces, and increased layering within operating systems. What is the term that describes Leos activities?
Which of the following is a system that has withstood benchmark testing and validation to meet user and evalua
Which of the following is a system that has withstood benchmark testing and validation to meet user and evaluation requirements?
what function?
The TCB is a security principle that ensures security within systems in all kinds of situations. One situation is when a process in one domain must access another domain in order to retrieve sensitive information. The TCB ensures that this action is performed in a secure manner by initiating what function?