a.
Memory mappingb.
Multistate hardwarec.
Multistate softwared.
Multistate compiler45. Enforcement of a system’s security policy does
a.
Consistencyb.
Efficiencyc.
Reliabilityd.
Effectiveness46. For a trusted computing base (TCB) to enforce the security policy, it must contain which of the following?
a.
Single-layer and separate domainb.
Privileged user and privileged processc.
Tamperproof and uncompromisabled.
Trusted rule-base and trusted program47. In the trusted computing base (TCB) environment, resource isolation does
a.
Containment of subjects and objectsb.
Protection controls of the operating systemc.
Imposition of mandatory access controld.
Auditing of subjects and objects48. Which of the following can lead to a single point-of-failure?
a.
Decentralized identity managementb.
Universal description, discovery, and integration registryc.
Application programming interfaced.
Web services description languageCentralized identity management, not decentralized identity management, is vulnerable to a single point-of-failure. Application programming interface (API) and Web services description language (WSDL) are not vulnerable to a single point-of-failure because API is defined as a subroutine library, and WSDL complements the UDDI standard.
49. Which of the following is most susceptible to a single point-of-failure?
a.
Quarantine serverb.
Proxy serverc.
Centralized authentication serverd.
Database server50. Which of the following provides a centralized approach to enforcing identity and security management aspects of service-oriented architecture (SOA) implementation using Web services?
a.
Unified modeling language (UML)b.
Extensible markup language (XML) gatewaysc.
Extended hypertext markup language (XHTML)d.
Extensible access control markup language (XACML)The other three choices do not provide identity and security management features. UML simplifies the complex process of software design. XHTML is a unifying standard that brings the benefits of XML to those of HTML. XACML is a general-purpose language for specifying access control policies.