The evaluation scheme, evaluation methodology, and certification processes are the responsibility of the evaluation authorities that run evaluation schemes and are outside the scope of the CC. The CC for IT security evaluation is the new standard for specifying and evaluating the security features of computer products and systems globally. The CC is intended to replace previous security criteria used in North America and Europe with a standard that can be used everywhere in the world effectively since early 1999.
34. Which of the following cannot be initiated by untrusted software?
a. Trusted channel
b. Overt channel
c. Security-compliant channel
d. Exploitable channel
An overt channel is a path within a computer system or network designed for the authorized data transfer. A security-compliant channel enforces the network policy. An exploitable channel is a covert channel intended to violate the security policy.
35. Countermeasures against emanation attacks include which of the following?
1. High watermark policy
2. Information label
3. Control zones
4. White noise
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 3 and 4
A high watermark policy is used to maintain an upper bound on fused data. An information label results from a floating label. The high watermark policy, information label, and floating label are part of a covert channel.
36. Which of the following can increase emanation attacks?
a. Greater separation between the system and the receiver
b. Higher signal-to-noise ratio
c. Wireless local-area network connections
d. More workstations of the same type in the same location
37. In the trust hierarchy of a computer system, which of the following is
a. Operating system
b. System user
c. Hardware/firmware
d. Application system
38. In organizations, isolating the information system security functions from nonsecurity functions is achieved through:
1. Hardware separation
2. Independent modules
3. Layered structure
4. Minimal interactions
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
39. In the trusted computing base (TCB) environment, the compromise resulting from the execution of a Trojan horse can be examined from which of the following perspectives?
a. Compromise from above
b. Compromise from within
c. Compromise from below