In an access validation error, the system is vulnerable because the access control mechanism is faulty. A configuration error occurs when user controllable settings in a system are set so that the system is vulnerable. Race condition error occurs when there is a delay between the time when a system checks to see if an operation is allowed by the security model and the time when the system actually performs the operation.
8. From a risk management viewpoint, new system interfaces are addressed in which of the following system development life cycle (SDLC) phases?
a. Initiation
b. Development/acquisition
c. Implementation
d. Operation/maintenance
9. System assurance requires which of the following?
1. Proof-of-origin
2. Proof-of-delivery
3. Techniques
4. Metrics
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 3 and 4
10. The initiation phase of the security certification and accreditation process does
a. Preparation
b. Resource identification
c. Action plan and milestones
d. Security plan acceptance
The other three choices are part of the initiation phase, which is the first phase, where it is too early to develop the action plan and milestones.
11. Which of the following comes first in the security certification and accreditation process of an information system?
a. Security certification
b. Security recertification
c. Security accreditation
d. Security reaccreditation
Recertification and reaccreditation occur periodically and sequentially whenever there is a significant change to the system or its operational environment as part of ongoing monitoring of security controls.
12. Which of the following security accreditation authority’s decision scenarios require justification for the decision?
1. Full accreditation of the system
2. Accredit the system with conditions
3. Deny the system accreditation
4. Defer the system accreditation
a. 1 only
b. 2 only
c. 1, 2, or 3
d. 1, 2, 3, or 4
13. In the continuous monitoring phase of the security certification and accreditation process, ongoing assessment of security controls is based on which of the following?
a. Configuration management documents
b. Action plan and milestone documents
c. Configuration control documents
d. Security impact analyses documents