c. 2 and 3
d. 1, 2, 3, and 4
199. In the trusted computing base (TCB) environment, which of the following is referred to when a failure results from the modifications to the hardware?
a. Compromise from above
b. Compromise from within
c. Compromise from below
d. Compromise from cross domains
200. Which of the following is the
a. Fault tolerance through redundancy
b. Security protection through isolation
c. Extendibility through adaptability
d. Distribution transparency through separation of components
201. Regarding Common Criteria (CC), which of the following provides an implementation-independent statement of security needs?
a. Target of evaluation (TOE)
b. Security target (ST)
c. Protection profile (PP)
d. Evaluation of assurance level (EAL)
TOE is incorrect because it is a product that has been installed and is being operated according to its guidance. ST is incorrect because it is an implementation-dependent statement of security needs for a specific identified TOE. EAL is incorrect because it is an assurance package, consisting of assurance requirements, representing a point on the CC predefined assurance scale.
202. Which of the following contains a security kernel, some trusted-code facilities, hardware, and some communication channels?
a. Security domain
b. Security model
c. Security perimeter
d. Security parameters
The security domain is a set of elements, a security policy, an authority, and a set of relevant activities. The security model is a formal presentation of the security policy enforced by the system. Examples of security parameters include passwords and encryption keys.
203. Phishing attacks are
a. Browser-oriented attacks
b. Server-oriented attacks
c. Network-oriented attacks
d. User-oriented attacks
204. In which of the following security operating modes is the system access secured to at least the top level?
a. Multilevel security mode
b. Dedicated security mode
c. Compartmented security mode
d. Controlled mode