Security Engineering

Security Engineering

Professional Development

63 Qs

quiz-placeholder

Similar activities

Calif. drivers permit test

Calif. drivers permit test

10th Grade - Professional Development

60 Qs

Olympia Wednesday

Olympia Wednesday

University - Professional Development

60 Qs

IT Audit KCw課程

IT Audit KCw課程

Professional Development

67 Qs

PRAXIS 5362

PRAXIS 5362

Professional Development

64 Qs

Real Estate Ch. 2

Real Estate Ch. 2

Professional Development

60 Qs

P&C Basics

P&C Basics

Professional Development

64 Qs

Working Capital CCP Exam Quiz

Working Capital CCP Exam Quiz

Professional Development

60 Qs

Reviewer

Reviewer

Professional Development

60 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Other

Professional Development

Hard

Created by

Shamsheer Khan

Used 1+ times

FREE Resource

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC provides levels of security that are classified in a hierarchical manner. Each level has a corresponding set of security requirements that must be met. To which of the following does Level A correspond?
Mandatory protection
Required protection
Verified protection
Validated protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC offers numbered divisions of security that can occur in each category. With this in mind, which of the following represents the highest level of security?
B2
D2
B1
D1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jim has been asked to assist with a security evaluation. He has heard other members of the teams talking about ‘‘TCB.’’ What does TCB stand for?
Taking care of business
Total computer base
Trusted computer base
Total communication bandwidth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the valid states in which a CPU can operate?
Processor
Supervisor
Problem
Wait

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization began developing the Common Criteria (CC) standard in 1990?
IEEE
ISC2
ISO
NIST

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?
Biba
Bell-LaPadula
Trusted Computer System
Clark-Wilson

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your CISSP study group is reviewing the Security Engineering domain in preparation for the exam. One of the members has a question. Which of the following is not one of the requirements for memory management?
Processing
Sharing
Protection
Relocation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?