c.
2 and 3d.
1, 2, 3, and 4199. In the trusted computing base (TCB) environment, which of the following is referred to when a failure results from the modifications to the hardware?
a.
Compromise from aboveb.
Compromise from withinc.
Compromise from belowd.
Compromise from cross domains200. Which of the following is the
a.
Fault tolerance through redundancyb.
Security protection through isolationc.
Extendibility through adaptabilityd.
Distribution transparency through separation of components201. Regarding Common Criteria (CC), which of the following provides an implementation-independent statement of security needs?
a.
Target of evaluation (TOE)b.
Security target (ST)c.
Protection profile (PP)d.
Evaluation of assurance level (EAL)TOE is incorrect because it is a product that has been installed and is being operated according to its guidance. ST is incorrect because it is an implementation-dependent statement of security needs for a specific identified TOE. EAL is incorrect because it is an assurance package, consisting of assurance requirements, representing a point on the CC predefined assurance scale.
202. Which of the following contains a security kernel, some trusted-code facilities, hardware, and some communication channels?
a.
Security domainb.
Security modelc.
Security perimeterd.
Security parametersThe security domain is a set of elements, a security policy, an authority, and a set of relevant activities. The security model is a formal presentation of the security policy enforced by the system. Examples of security parameters include passwords and encryption keys.
203. Phishing attacks are
a.
Browser-oriented attacksb.
Server-oriented attacksc.
Network-oriented attacksd.
User-oriented attacks204. In which of the following security operating modes is the system access secured to at least the top level?
a.
Multilevel security modeb.
Dedicated security modec.
Compartmented security moded.
Controlled mode