Security Engineering

Security Engineering

Professional Development

63 Qs

quiz-placeholder

Similar activities

Quiz Pengetahuan Produk Garudaafood

Quiz Pengetahuan Produk Garudaafood

Professional Development

60 Qs

Kuiz Kenali Negara Kitani

Kuiz Kenali Negara Kitani

7th Grade - Professional Development

60 Qs

GSuite Toolbox

GSuite Toolbox

Professional Development

65 Qs

SKD CPNS 2024

SKD CPNS 2024

Professional Development

65 Qs

SIMULADOR sin fisica ni quimica

SIMULADOR sin fisica ni quimica

Professional Development

64 Qs

NARUTO QUIZ

NARUTO QUIZ

KG - Professional Development

61 Qs

Basics of Investment Banking ( 65 Q)

Basics of Investment Banking ( 65 Q)

Professional Development

65 Qs

ANIME QUIZ

ANIME QUIZ

KG - Professional Development

60 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Other

Professional Development

Hard

Created by

Shamsheer Khan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC provides levels of security that are classified in a hierarchical manner. Each level has a corresponding set of security requirements that must be met. To which of the following does Level A correspond?
Mandatory protection
Required protection
Verified protection
Validated protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC offers numbered divisions of security that can occur in each category. With this in mind, which of the following represents the highest level of security?
B2
D2
B1
D1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jim has been asked to assist with a security evaluation. He has heard other members of the teams talking about ‘‘TCB.’’ What does TCB stand for?
Taking care of business
Total computer base
Trusted computer base
Total communication bandwidth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the valid states in which a CPU can operate?
Processor
Supervisor
Problem
Wait

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization began developing the Common Criteria (CC) standard in 1990?
IEEE
ISC2
ISO
NIST

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?
Biba
Bell-LaPadula
Trusted Computer System
Clark-Wilson

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your CISSP study group is reviewing the Security Engineering domain in preparation for the exam. One of the members has a question. Which of the following is not one of the requirements for memory management?
Processing
Sharing
Protection
Relocation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?