Topic 3: . Security Architecture and Engineering
Who in the organization is accountable for classification of data information assets?
A.
Data owner
B.
Data architect
C.
Chief Information Security Officer (CISO)
D.
Chief Information Officer (CIO)
Data owner
Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?
A.
Confidentiality
B.
Integrity
C.
Identification
D.
Availability
Confidentiality
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
A.
Common Vulnerabilities and Exposures (CVE)
B.
Common Vulnerability Scoring System (CVSS)
C.
Asset Reporting Format (ARF)
D.
Open Vulnerability and Assessment Language (OVAL)
Common Vulnerability Scoring System (CVSS)
Which of the following mobile code security models relies only on trust?
A.
Code signing
B.
Class authentication
C.
Sandboxing
D.
Type safety
Code signing
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
A.
Layer 2 Tunneling Protocol (L2TP)
B.
Link Control Protocol (LCP)
C.
Challenge Handshake Authentication Protocol (CHAP)
D.
Packet Transfer Protocol (PTP)
Link Control Protocol (LCP)
Page 5 out of 298 Pages |
Previous |