The other three choices do not deal with security states. Information system boundary means all components of a system to be authorized for operation have a defined boundary, and it excludes separately authorized systems to which the system is connected. Information system resilience is the capability of a system to continue to operate while under attack, even if in a degraded or debilitated state, and to rapidly recover operational capabilities for essential functions after a successful attack. Security control assessment is the testing and/or evaluation of the security controls (i.e., management, operational, and technical controls) to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements of an information system.
123. In the trusted computing base (TCB) environment, which of the following is referred to when a trusted component is accidentally failed?
a. Compromise from above
b. Compromise from within
c. Compromise from below
d. Compromise from cross domains
124. When building or acquiring new applications systems, which of the following specifically deal with data security requirements?
a. Sequencing plan
b. System lifecycle
c. Technical architecture
d. Logical architecture
A technical (physical) architecture defines subsystems, configuration items, data allocations, interfaces, and commons services that collectively provide a physical view of the target systems environment. The combination of logical and technical architecture can make up the organization’s total architecture.
A sequencing plan defines the actions that must be taken and their schedules, along with costs to cost-effectively evolve from the current to the future systems operating environment. A system life cycle defines the policies, processes, and products for managing information technology investments from conception, development, and deployment through maintenance, support, and operation.
125. Information architecture does
a. Collection of data
b. Management of data
c. Use of data
d. Archiving of data
126. Useful information architecture links better with which of the following?
a. Business planning to information technology planning
b. Information engineering to information systems
c. Applications security to logical security
d. Network security to encryption methods
127. Which of the following action items is not a part of security principle of “reduce vulnerabilities”?
a. Strive for simplicity
b. Implement least privilege
c. Base security on open standards for portability and interoperability
d. Minimize the system elements to be trusted