The evaluation scheme, evaluation methodology, and certification processes are the responsibility of the evaluation authorities that run evaluation schemes and are outside the scope of the CC. The CC for IT security evaluation is the new standard for specifying and evaluating the security features of computer products and systems globally. The CC is intended to replace previous security criteria used in North America and Europe with a standard that can be used everywhere in the world effectively since early 1999.
34. Which of the following cannot be initiated by untrusted software?
a.
Trusted channelb.
Overt channelc.
Security-compliant channeld.
Exploitable channelAn overt channel is a path within a computer system or network designed for the authorized data transfer. A security-compliant channel enforces the network policy. An exploitable channel is a covert channel intended to violate the security policy.
35. Countermeasures against emanation attacks include which of the following?
1.
High watermark policy2.
Information label3.
Control zones4.
White noisea.
1 and 2b.
1 and 3c.
2 and 3d.
3 and 4A high watermark policy is used to maintain an upper bound on fused data. An information label results from a floating label. The high watermark policy, information label, and floating label are part of a covert channel.
36. Which of the following can increase emanation attacks?
a.
Greater separation between the system and the receiverb.
Higher signal-to-noise ratioc.
Wireless local-area network connectionsd.
More workstations of the same type in the same location37. In the trust hierarchy of a computer system, which of the following is
a.
Operating systemb.
System userc.
Hardware/firmwared.
Application system38. In organizations, isolating the information system security functions from nonsecurity functions is achieved through:
1.
Hardware separation2.
Independent modules3.
Layered structure4.
Minimal interactionsa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 439. In the trusted computing base (TCB) environment, the compromise resulting from the execution of a Trojan horse can be examined from which of the following perspectives?
a.
Compromise from aboveb.
Compromise from withinc.
Compromise from below