Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Exam Prep Questions

  1. Which of the following best describes a superscalar processor?

    circle.jpg

    A.

    A superscalar processor can execute only one instruction at a time.

    circle.jpg

    B.

    A superscalar processor has two large caches that are used as input and output buffers.

    circle.jpg

    C.

    A superscalar processor can execute multiple instructions at the same time.

    circle.jpg

    D.

    A superscalar processor has two large caches that are used as output buffers.

  2. Which of the following are developed by programmers and used to allow the bypassing of normal processes during development but are left in the software when it ships to the customer?

    circle.jpg

    A.

    Back doors

    circle.jpg

    B.

    Traps

    circle.jpg

    C.

    Buffer overflows

    circle.jpg

    D.

    Covert channels

  3. Carl has noticed a high level of TCP traffic in and out of the network. After running a packet sniffer, he discovered malformed TCP ACK packets with unauthorized data. What has Carl discovered?

    circle.jpg

    A.

    Buffer overflow attack

    circle.jpg

    B.

    Asynchronous attack

    circle.jpg

    C.

    Covert channel attack

    circle.jpg

    D.

    DoS attack

  4. Which of the following types of CPUs can perform multiple operations from a single instruction?

    circle.jpg

    A.

    DITSCAP

    circle.jpg

    B.

    RISC

    circle.jpg

    C.

    NIACAP

    circle.jpg

    D.

    CISC

  5. Which of the following standards evaluates functionality and assurance separately?

    circle.jpg

    A.

    TCSEC

    circle.jpg

    B.

    TNI

    circle.jpg

    C.

    ITSEC

    circle.jpg

    D.

    CTCPEC

  6. Which of the following was the first model developed that was based on confidentiality?

    circle.jpg

    A.

    Bell-LaPadula

    circle.jpg

    B.

    Biba

    circle.jpg

    C.

    Clark-Wilson

    circle.jpg

    D.

    Take-Grant

  7. Which of the following models is integrity based and was developed for commercial applications?

    circle.jpg

    A.

    Information Flow

    circle.jpg

    B.

    Clark-Wilson

    circle.jpg

    C.

    Bell-LaPadula

    circle.jpg

    D.

    Brewer-Nash

  8. Which of the following does the Biba model address?

    circle.jpg

    A.

    Focuses on internal threats

    circle.jpg

    B.

    Focuses on external threats

    circle.jpg

    C.

    Addresses confidentiality

    circle.jpg

    D.

    Addresses availability

  9. Which model is also known as the Chinese Wall model?

    circle.jpg

    A.

    Biba

    circle.jpg

    B.

    Take-Grant

    circle.jpg

    C.

    Harrison-Ruzzo-Ullman

    circle.jpg

    D.

    Brewer-Nash

  10. Which of the following examines integrity and availability?

    circle.jpg

    A.

    Orange Book

    circle.jpg

    B.

    Brown Book

    circle.jpg

    C.

    Red Book

    circle.jpg

    D.

    Purple Book

  11. What is the purpose of the *-property in the Bell-LaPadula model?

    circle.jpg

    A.

    No read up

    circle.jpg

    B.

    No write up

    circle.jpg

    C.

    No read down

    circle.jpg

    D.

    No write down

  12. What is the purpose of the simple integrity property of the Biba model?

    circle.jpg

    A.

    No read up

    circle.jpg

    B.

    No write up

    circle.jpg

    C.

    No read down

    circle.jpg

    D.

    No write down

  13. Which of the following can be used to connect different MAC systems together?

    circle.jpg

    A.

    Labels

    circle.jpg

    B.

    Reference model

    circle.jpg

    C.

    Controls

    circle.jpg

    D.

    Guards

  14. Which of the following security modes of operation best describes when a user has a valid need to know all data?

    circle.jpg

    A.

    Dedicated

    circle.jpg

    B.

    System High

    circle.jpg

    C.

    Compartmented

    circle.jpg

    D.

    Multilevel

  15. Which of the following security models make use of the TLC concept?

    circle.jpg

    A.

    Biba

    circle.jpg

    B.

    Clark Wilson

    circle.jpg

    C.

    Bell-LaPadula

    circle.jpg

    D.

    Brewer Nash

  • + Share This
  • 🔖 Save To Your Account