The other three choices do not deal with security states. Information system boundary means all components of a system to be authorized for operation have a defined boundary, and it excludes separately authorized systems to which the system is connected. Information system resilience is the capability of a system to continue to operate while under attack, even if in a degraded or debilitated state, and to rapidly recover operational capabilities for essential functions after a successful attack. Security control assessment is the testing and/or evaluation of the security controls (i.e., management, operational, and technical controls) to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements of an information system.
123. In the trusted computing base (TCB) environment, which of the following is referred to when a trusted component is accidentally failed?
a.
Compromise from aboveb.
Compromise from withinc.
Compromise from belowd.
Compromise from cross domains124. When building or acquiring new applications systems, which of the following specifically deal with data security requirements?
a.
Sequencing planb.
System lifecyclec.
Technical architectured.
Logical architectureA technical (physical) architecture defines subsystems, configuration items, data allocations, interfaces, and commons services that collectively provide a physical view of the target systems environment. The combination of logical and technical architecture can make up the organization’s total architecture.
A sequencing plan defines the actions that must be taken and their schedules, along with costs to cost-effectively evolve from the current to the future systems operating environment. A system life cycle defines the policies, processes, and products for managing information technology investments from conception, development, and deployment through maintenance, support, and operation.
125. Information architecture does
a.
Collection of datab.
Management of datac.
Use of datad.
Archiving of data126. Useful information architecture links better with which of the following?
a.
Business planning to information technology planningb.
Information engineering to information systemsc.
Applications security to logical securityd.
Network security to encryption methods127. Which of the following action items is not a part of security principle of “reduce vulnerabilities”?
a.
Strive for simplicityb.
Implement least privilegec.
Base security on open standards for portability and interoperabilityd.
Minimize the system elements to be trusted