1. Right Answer: D
Explanation: Automated theorem proving (ATP) is the proving of mathematical theorems by a computer program. Depending on the underlying logic, the problem of deciding the validity of a theorem varies from trivial to impossible. Commercial use of automated theorem proving is mostly concentrated in integrated circuit design and verification.
2. Right Answer: A
Explanation: With 0'defense in depth', more than one subsystem needs to be compromised to compromise the security of the system and the information it holds.Subsystems should default to secure settings, and wherever possible should be designed to 'fail secure' rather than 'fail insecure'.
3. Right Answer: B
Explanation: With 0'defense in depth', more than one subsystem needs to be compromised to compromise the security of the system and the information it holds.Subsystems should default to secure settings, and wherever possible should be designed to 'fail secure' rather than 'fail insecure'.
Security should ALWAYS be an all or nothing issue. multiple-choice True True for trusted systems only True for untrusted systems only False None of the choices. 4 Security should not be an all or nothing issue. The designers and operators of systems should assume that security breaches are inevitable in the long term. Full audit trails should be kept of system activity, so that when a security breach occurs, the mechanism and extent of the breach can be determined.
The 'trusted systems' approach has been predominant in the design of: multiple-choice many earlier Microsoft OS products the IBM AS/400 series the SUN Solaris series most OS products in the market None of the choices. 1 The 'trusted systems' approach has been predominant in the design of many Microsoft OS products, due to the long-standing Microsoft policy of emphasizing functionality and 'ease of use'.
Which of the following terms generally refers to small programs designed to take advantage of a software flaw that has been discovered? multiple-choice exploit patch quick fix service pack malware None of the choices. 1 The term ''exploit'' generally refers to small programs designed to take advantage of a software flaw that has been discovered, either remote or local. The code from the exploit program is frequently reused in trojan horses and computer viruses. In some cases, a vulnerability can lie in a certain programs processing of a specific file type, such as a non-executable media file.'
4. Right Answer: E
Explanation: The term 'exploit' generally refers to small programs designed to take advantage of a software flaw that has been discovered, either remote or local. The code from the exploit program is frequently reused in trojan horses and computer viruses. In some cases, a vulnerability can lie in a certain programs processing of a specific file type, such as a non-executable media file.
5. Right Answer: B
Explanation: Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a malicious person. Even machines that operate as a closed system can be eavesdropped upon via monitoring the faint electromagnetic transmissions generated by the hardware such as TEMPEST.
Leave a comment