The other three choices are vulnerable to a single point-of-failure. A converged network combines both data and voice, and as such it is vulnerable. Password synchronization can be a single point-of-failure because it uses the same password for many resources. The domain name system (DNS) server can become a single point-of-failure if there are no fault-tolerant and redundant mechanisms.
116. It is best to assume that external computer systems are:
a. Simple
b. Secure
c. Insecure
d. Complex
117. Which of the following memory protection mechanisms deal with security impact levels?
a. System partitioning
b. Nonmodifiable executable programs
c. Resource isolation
d. Domain separation
The other three choices are incorrect because they do not deal with security impact levels. A nonmodifiable executable program is the one that loads and executes the operating environment and application system from hardware-enforced and read-only media (e.g., CD-R/DVD-R disk drives). Resource isolation is the containment of subjects and objects in a system in such a way that they are separated from one another. Domain separation relates to the mechanisms that protect objects in the system.
118. Which of the following maintains the integrity of information that is sent over a channel?
a. Communication channel
b. Security-compliant channel
c. Trusted channel
d. Memory channel
119. Which of the following enforces the network policy?
a. Exploitable channel
b. Communications channel
c. Security-compliant channel
d. Memory channel
120. The use of which of the following can lead to the existence of a covert channel?
a. Data label
b. Dual label
c. Floating label
d. Fixed label
121. Which of the following is needed for the correct operation of other security mechanisms?
a. Covert storage channel
b. Trusted channel
c. Covert timing channel
d. Overt channel
122. Which of the following determines the extent to which changes to an information system have affected the security state of the system?
a. Information system boundary
b. Information system resilience
c. Security impact analysis
d. Security control assessment