Tag: security

Questions Related to security

  1. The British Standards Institute (BSI) 7799

  2. ISO 27002

  3. The Open Web Application Security Project (OWASP) Top Ten Project

  4. TSP-Secure


Correct Option: C
  1. Access control lists (ACLs)

  2. Capability lists

  3. Triples

  4. Properties


Correct Option: A
  1. Systems Security Engineering Capability Maturity Model (SSE-CMM)

  2. Capability Maturity Model Integration (CMMi)

  3. Bell-LaPadula model

  4. Systems Engineering Capability Maturity Model (SE-CMM)


Correct Option: A
  1. A worm

  2. A virus

  3. a trojan horse

  4. a multipart virus


Correct Option: B
  1. Detective

  2. Corrective

  3. Preventive

  4. Administrative


Correct Option: C

Which of the following is not an attack against operations?

  1. Brute force

  2. Denial of service

  3. Buffer overflow

  4. ICMP Sting


Correct Option: D

If a security was not part of the development of a database, how is it usually handled?

  1. Through cell suppression

  2. By a trusted backend

  3. By a trusted front-end

  4. By views


Correct Option: C
  1. An unsolicited message was sent

  2. A cell phone was cloned

  3. An IM channel introduced a worm

  4. Traffic was analyzed


Correct Option: A