2. Repeatable results
3. Defensible results
4. Evidential results
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
107. Regarding Common Criteria (CC), reference monitor concept is applied to enforce which of the following?
a. Security Target (ST)
b. Target of Evaluations (TOE)
c. Protection Profile (PP)
d. System Specifications
A protection profile (PP) is a template for a security target (ST). Whereas a ST always describes a specific TOE (e.g., firewall v18.5), a PP is intended to describe a TOE type (e.g., firewall). A PP is an implementation-independent statement of security needs for a product type and a ST is an implementation-dependent construct. The ST may be based on one or more PPs. System specifications refer to the roles that a ST or PP should or should not fulfill.
108. What is a communication channel that enables a process to transfer information in a manner that violates the system’s security policy called?
a. Communication channel
b. Covert channel
c. Exploitable channel
d. Overt channel
109. Perimeter-based network security technologies such as firewalls are inadequate to protect service-oriented architectures (SOAs) providing Web services due to which of the following reasons?
1. Transport layer security (TLS)
2. Hypertext transfer protocol (HTTP)
3. Simple object access protocol (SOAP)
4. Reverse SOAP
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 1, 2, 3, and 4
The Transport Layer Security (TLS), which is used to authenticate and encrypt Web-based messages, is inadequate for protecting SOAP messages because it is designed to operate between two endpoints. TLS cannot accommodate Web services’ inherent capability to forward messages to multiple other Web services simultaneously.
SOAP is transmitted over Hypertext Transfer Protocol (HTTP), which is allowed to flow without restriction through most firewalls. Application-aware firewalls in the form of HTTP proxies for HTTP-based traffic allow organizations to limit what an application-layer protocol can and cannot do.
Because SOAP travels over HTTP, it is traditionally left open for Web traffic at perimeter firewalls. Additionally, with the Reverse SOAP (PAOS) specification, SOAP messages can pass through firewalls that limit incoming HTTP traffic but allow outgoing HTTP traffic. Some firewalls have begun to support blocking or allowing SOAP requests based on the source or destination of the request, but more robust and intelligent firewalls are needed to defend networks against malicious SOAP attacks.
SOAs are dynamic and can seldom be fully constrained to the physical boundaries of a single network.
110. Which of the following
a. XML encryption
b. XML gateway
c. XML signature
d. XML parser