Answer: B
Hint: Dedicated Mode, System High Mode, Compartmented Mode, and Multilevel Mode
Answer: A
Hint: When the operator boots the system in single-user mode, the user front-end security controls are not loaded. This mode should be used only for recovery and maintenance procedures, and all operations should be logged and audited.
Answer: A
Hint: An audit trail is a record of events to piece together what has happended and allow enforcement of Individual accountability by creating a reconstruction of events. They can be used to assist in the proper implementation of the other controls, however.
Answer: B
Hint: Degaussing is recommended as the best method for purging most magnetic media. Answer A is not recommended because the application may not completely overwrite the old data properly. Answer C is a rarely used method of media destruction, and acid solutions should be used in a well-ventilated area only by qualified personnel. Answer D is wrong.
Answer: B
Hint: Answer B is a distracter; the other answers reflect proper security goals of an audit mechanism
Answer: C
Hint: Reviewing audit data should be a function separate from the day-to-day administration of the system.
Answer: B
Hint: In addition to being used as a transaction control verification mechanism, output controls are used to ensure that output, such as printed reports, is distributed securely. Answer A is an example of change control, C is an example of application controls, and D is an example of recovery controls.
Answer: A
Hint: Reviews can be conducted by, among others, in-house systems personnel (a self-audit), the organization's internal audit staff, or external auditors.
Answer: D
Hint: The trusted computing base (TCB) represents totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy. Answer A describes the reference monitor concept, answer B refers to a sensitivity label, and answer C describes formal verification.
Answer: B
Hint: Object reuse mechanisms ensure system resources are allocated and assigned among authorized users in a way that prevents the leak of sensitive information, and they ensure that the authorized user of the system does not obtain residual information from system resources. Answer A is incorrect, answer C is incorrect, and answer D refers to authorization, the granting of access rights to a user, program, or process.
Answer: B
Hint: Prenumbered forms are an example of preventative controls. They can also be considered a transaction concept and input control.
Answer: C
Hint: Operational assurance is the process of reviewing an operational system to see that security controls, both automated and manual, are functioning correctly and effecively. Operational assurance addresses wheather the system's technical features are being bypassed or have vulnerabilities and wheather required procedures are being followed. Answer A is a description of an audit trail review, answer B is a description of a benefit of incident handling, and answer D describes a personnel control.
Answer: C
Hint: Sanitization is the process of removing information from used data media to prevent data remanence. Different media require different types of sanitation. All the others are examples of proper media controls.
Answer: C
Hint: The three common levels of operator privileges, based on the concept of "least privilege," are :
- Read Only -- Lowest level, view data only
- Read/Write -- View and modify data
- Access Change -- Highest level, right to change data/operator permissions
Answer D is a distracter.
Answer: D
Hint: A covert storage channel typically involves a finite resource (e.g., sectors on a disk) that is shared by two subjects at different security levels. Answer a is a partial description of a covert timing channel, and answer B is a generic definition of a channel. A channel may also refer to the mechanism by which the path is effected. Answer C is a higher-level definition of a covert channel. While a covert storage channel fits this definition generically, answer D is the proper specific defintion.
Answer: C
Hint: Why the transaction was processed is not initialty a concern of the audit log, But we will investigate it later. The other three elements are all important information that the audit log of the transaction should record.
Answer: A
Hint: The primary benefits of employing an incident-handling capability are containing and repairing damage from incidents and preventing future damage. Answer A is a benefit of employing "separation of duties" controls.
Answer: A
Hint: An audit trail is a set of records that collectively provide documentary evidence of processing used to aid in tracing from original transactions forward to related records and reports and/or backword from records and reports to their component source transactions. Answer B is a description of a multilevel device, and answer C refers to a network reference monitor. Answer D is incorrect because audit trails are detective, and answwer D describes a preventative process - access control.
Answer: A
Hint: Answer B describes least privilege, answer C describes record retention, and answer D describes separation on duties.
Answer: A
Hint: Which choice a is most certainly an example of a threat to a system's integrity, it is considered unintentional loss, not an intentional activity.
Answer: B
Answer: A
Hint: The least privilege principle requires that each subject in a system be granted the most restricitive set of privileges (or lowest clearance) needed for the performance of authorized tasks. Answer B describes separation of privilege, answer C describes a security level, and answer D is a distracter.
Answer: A
Hint: Answer B describes a vulnerability, answer c describes an asset, and answer D describes risk management.
Answer: B
Hint: For proper separation of duties, the function of user account establishment and maintenance should be separated from the function of initiating and authorizing the creation of the account. User account management focuses on identification, authentication, and access authorizations.
Answer: D
Hint: The salami fraud is an automated fraud technique. I the salami fraud, a programmer will create or alter a program to move small amounts of money into his personal bank account. The amounts are intended to be so small as to be unnoticed,such as rounding in foreign currency exchange transactions. Hence the reference to slicing a salami. The other three choices are common techniques used by an intruder to gain either physical access or system access.
Answer: C
Hint: Orange Book B2 class systems do not need to be protected from covert timing channels, Covert channel analysis must be performed for B2-level class systems to protect against only covert storage channels. B3 class systems need to be protected from both covert storage channels and covert timing channels.
Answer: D
Hint: Separation of duties means that the operators are prevented from generating and verifying transactions alone, For example. A task might be divided into different smaller tasks to accomplish this, or in the case of an operator with multiple duties, the operator makes a logical, functional job change when performing such conflicting duies. Answer A is need-to-know, answer B is dual-control, and C is job rotation.
Answer: B
Hint: Answer A, the Red book, is the Trusted Network interpretation (TN) summary of network requirements (described in the Telecommunications and Network Security domain; C, the Green Book, is Department of Defence (DoD) Password Management Guideline; and D, the Dark Green Book, is The Guide to Understanding Data Remanence in Automated Information Systems.
Answer: D
Hint: A covert timing channel alters the timing of parts of the system to enable it to be used to communicate information covertly (outside the normal security function). Answer A is the description of the use of a covert storage channel, B is a technique to combat the use of covert channels, and C is the Orange Book requirement for B3,B2, and A1 evaluated systems
Answer: A
Hint: This description of a clipping level is the best. It is not B because one reason to create clipping levels is to prevent auditors from having to examine every error. The answer C is a common use for clipping levels but is not a definition.