Network monitors can protect against spoofing. Quality assurance programs can improve quality in products and processes through upfront planning.
27. From a security viewpoint, which of the following acts like a first line-of-defense?
a. Remote server
b. Web server
c. Firewall
d. Secure shell program
The other three choices cannot act like a first line-of-defense. Both remote server and Web server are often the targets for an attacker. A secure shell program replaces the unsecure programs such as rlogin, rsh, rcp, Telnet, and rdist commands with a more secure version that adds authentication and encryption mechanisms to provide for greater security.
28. Normal information can be reliably sent through all the following ways
a. Increasing the bandwidth for a covert channel
b. Using error correcting code
c. Using a hamming code
d. Introducing page faults at random
The other three choices can send normal information reliably because they use an error correcting code (e.g., hamming code) or introducing page faults at random (i.e., modulating paging rates between 0 and 1).
29. Covert channel analysis is
a. Cross-domain systems
b. Multilevel secure systems
c. Multilayer systems
d. Multiple security level systems
The other three choices are good candidates for covert channel analysis and should be tested on all vendor-identified covert channel targets.
30. All the following are factors favoring acceptability of a covert channel
a. Floating label
b. Low bandwidth
c. Fixed label
d. Absence of application software
31. From an information security viewpoint, a Security-in-Depth strategy means which of the following?
a. User training and awareness
b. Policies and procedures
c. Layered protections
d. Redundant equipment
32. Time-to-exploitation metric can be used to determine the presence of which of the following?
a. Memory channel
b. Communications channel
c. Covert channel
d. Exploitable channel
33. All the following are outside the scope of the Common Criteria (CC)
a. Evaluation scheme
b. Evaluation methodology
c. Evaluation base
d. Certification processes