Security Engineering

Security Engineering

Professional Development

63 Qs

quiz-placeholder

Similar activities

TSM KODAWARI - Certificación 2025

TSM KODAWARI - Certificación 2025

Professional Development

65 Qs

Football

Football

KG - Professional Development

65 Qs

BT Ch-9 Control, Security and Audit

BT Ch-9 Control, Security and Audit

Professional Development

62 Qs

AZ-900 Practice Test 4

AZ-900 Practice Test 4

Professional Development

66 Qs

G K 2

G K 2

Professional Development

60 Qs

Placement Exam

Placement Exam

Professional Development

60 Qs

U 9-16 Review Interchange 1

U 9-16 Review Interchange 1

Professional Development

63 Qs

TES KONTEN TUTOR KE-3

TES KONTEN TUTOR KE-3

Professional Development

60 Qs

Security Engineering

Security Engineering

Assessment

Quiz

Other

Professional Development

Practice Problem

Hard

Created by

Shamsheer Khan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC provides levels of security that are classified in a hierarchical manner. Each level has a corresponding set of security requirements that must be met. To which of the following does Level A correspond?

Mandatory protection
Required protection
Verified protection
Validated protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TCSEC offers numbered divisions of security that can occur in each category. With this in mind, which of the following represents the highest level of security?

B2
D2
B1
D1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jim has been asked to assist with a security evaluation. He has heard other members of the teams talking about ‘‘TCB.’’ What does TCB stand for?

Taking care of business
Total computer base
Trusted computer base
Total communication bandwidth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the valid states in which a CPU can operate?

Processor
Supervisor
Problem
Wait

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization began developing the Common Criteria (CC) standard in 1990?

IEEE
ISC2
ISO
NIST

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model uses security labels to grant access to objects through the use of transformation procedures?

Biba
Bell-LaPadula
Trusted Computer System
Clark-Wilson

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your CISSP study group is reviewing the Security Engineering domain in preparation for the exam. One of the members has a question. Which of the following is not one of the requirements for memory management?

Processing
Sharing
Protection
Relocation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?