Exam Prep Questions
Which of the following best describes a superscalar processor?
A.
A superscalar processor can execute only one instruction at a time.
B.
A superscalar processor has two large caches that are used as input and output buffers.
C.
A superscalar processor can execute multiple instructions at the same time.
D.
A superscalar processor has two large caches that are used as output buffers.
Which of the following are developed by programmers and used to allow the bypassing of normal processes during development but are left in the software when it ships to the customer?
A.
Back doors
B.
Traps
C.
Buffer overflows
D.
Covert channels
Carl has noticed a high level of TCP traffic in and out of the network. After running a packet sniffer, he discovered malformed TCP ACK packets with unauthorized data. What has Carl discovered?
A.
Buffer overflow attack
B.
Asynchronous attack
C.
Covert channel attack
D.
DoS attack
Which of the following types of CPUs can perform multiple operations from a single instruction?
A.
DITSCAP
B.
RISC
C.
NIACAP
D.
CISC
Which of the following standards evaluates functionality and assurance separately?
A.
TCSEC
B.
TNI
C.
ITSEC
D.
CTCPEC
Which of the following was the first model developed that was based on confidentiality?
A.
Bell-LaPadula
B.
Biba
C.
Clark-Wilson
D.
Take-Grant
Which of the following models is integrity based and was developed for commercial applications?
A.
Information Flow
B.
Clark-Wilson
C.
Bell-LaPadula
D.
Brewer-Nash
Which of the following does the Biba model address?
A.
Focuses on internal threats
B.
Focuses on external threats
C.
Addresses confidentiality
D.
Addresses availability
Which model is also known as the Chinese Wall model?
A.
Biba
B.
Take-Grant
C.
Harrison-Ruzzo-Ullman
D.
Brewer-Nash
Which of the following examines integrity and availability?
A.
Orange Book
B.
Brown Book
C.
Red Book
D.
Purple Book
What is the purpose of the *-property in the Bell-LaPadula model?
A.
No read up
B.
No write up
C.
No read down
D.
No write down
What is the purpose of the simple integrity property of the Biba model?
A.
No read up
B.
No write up
C.
No read down
D.
No write down
Which of the following can be used to connect different MAC systems together?
A.
Labels
B.
Reference model
C.
Controls
D.
Guards
Which of the following security modes of operation best describes when a user has a valid need to know all data?
A.
Dedicated
B.
System High
C.
Compartmented
D.
Multilevel
Which of the following security models make use of the TLC concept?
A.
Biba
B.
Clark Wilson
C.
Bell-LaPadula
D.
Brewer Nash