a. Memory mapping
b. Multistate hardware
c. Multistate software
d. Multistate compiler
45. Enforcement of a system’s security policy does
a. Consistency
b. Efficiency
c. Reliability
d. Effectiveness
46. For a trusted computing base (TCB) to enforce the security policy, it must contain which of the following?
a. Single-layer and separate domain
b. Privileged user and privileged process
c. Tamperproof and uncompromisable
d. Trusted rule-base and trusted program
47. In the trusted computing base (TCB) environment, resource isolation does
a. Containment of subjects and objects
b. Protection controls of the operating system
c. Imposition of mandatory access control
d. Auditing of subjects and objects
48. Which of the following can lead to a single point-of-failure?
a. Decentralized identity management
b. Universal description, discovery, and integration registry
c. Application programming interface
d. Web services description language
Centralized identity management, not decentralized identity management, is vulnerable to a single point-of-failure. Application programming interface (API) and Web services description language (WSDL) are not vulnerable to a single point-of-failure because API is defined as a subroutine library, and WSDL complements the UDDI standard.
49. Which of the following is most susceptible to a single point-of-failure?
a. Quarantine server
b. Proxy server
c. Centralized authentication server
d. Database server
50. Which of the following provides a centralized approach to enforcing identity and security management aspects of service-oriented architecture (SOA) implementation using Web services?
a. Unified modeling language (UML)
b. Extensible markup language (XML) gateways
c. Extended hypertext markup language (XHTML)
d. Extensible access control markup language (XACML)
The other three choices do not provide identity and security management features. UML simplifies the complex process of software design. XHTML is a unifying standard that brings the benefits of XML to those of HTML. XACML is a general-purpose language for specifying access control policies.