You Ace 2026-2027 Includes Frequently Tested
Questions With ELABORATED 100% Correct
COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. Which of the following is used in database information security to hide
information?
A. Inheritance
B. Polyinstantiation
C. Polymorphism
D. Delegation - ANSWER B. polyinstantiation
2. Which of the following computer design approaches is based on the fact
that in earlier technologies, the instruction fetch was the longest part of the
cycle?
A. Pipelining
B. Reduced Instruction Set Computers (RISC)
C. Complex Instruction Set Computers (CISC)
D. Scalar processors - ANSWER C. complex instruction set computers
CISC
3. What is used to protect programs from all unauthorized modification or
executional interference?
A. A protection domain
B. A security perimeter
, C. Security labels
D. Abstraction - ANSWER A. a protection domain
4. What is called a system that is capable of detecting that a fault has occurred
and has the ability to correct the fault or operate around it?
A. A fail safe system
B. A fail soft system
C. A fault-tolerant system
D. A failover system - ANSWER C. a fault tolerant system
5. What is defined as the hardware, firmware and software elements of a
trusted computing base that implement the reference monitor concept?
A. The reference monitor
B. Protection rings
C. A security kernel
D. A protection domain - ANSWER C. a security kernal
6. Which of the following rules is least likely to support the concept of least
privilege?
A. The number of administrative accounts should be kept to a minimum.
B. Administrators should use regular accounts when performing routine
operations like reading mail.
C. Permissions on tools that are likely to be used by hackers should be
as restrictive as possible.
D. Only data to and from critical systems and applications should be
allowed through the firewall. - ANSWER D. Only data to and from
critical systems and applications should be allowed through the
firewall.
,7. Which of the following is an unintended communication path that is NOT
protected by the system's normal security mechanisms?
A. A trusted path
B. A protection domain
C. A covert channel
D. A maintenance hook - ANSWER C. a covert channel
8. Which of the following is used to interrupt the opportunity to use or
perform collusion to subvert operation for fraudulent purposes?
A. Key escrow
B. Rotation of duties
C. Principle of need-to-know
D. Principle of least privilege - ANSWER B. rotation of duties
9. Which of the following is best defined as an administrative declaration by a
designated authority that an information system is approved to operate in a
particular security configuration with a prescribed set of safeguards?
A. Certification
B. Declaration
C. Audit
D. Accreditation - ANSWER D. accreditation
10.Which of the following is best defined as a circumstance in which a
collection of information items is required to be classified at a higher
security level than any of the individual items that comprise it?
A. Aggregation
B. Inference
C. Clustering
D. Collision - ANSWER A. aggregation
, 11.Which of the following best defines add-on security?
A. Physical security complementing logical security measures.
B. Protection mechanisms implemented as an integral part of an
information system.
C. Layer security.
D. Protection mechanisms implemented after an information system has
become operational. - ANSWER D. protection mechanisms
implemented after an information system has become operational
12.Which of the following is best defined as a mode of system termination that
automatically leaves system processes and components in a secure state
when a failure occurs or is detected in a system?
A. Fail proof
B. Fail soft
C. Fail safe
D. Fail Over - ANSWER C fail safe
13.The preliminary steps to security planning include all of the following
EXCEPT which of the following?
A. Establish objectives.
B. List planning assumptions.
C. Establish a security audit function.
D. Determine alternate courses of action - ANSWER C. establish a
security audit function
14.Step-by-step instructions used to satisfy control requirements is called a:
A. policy
B. standard