text
stringlengths
0
108
repository. Since there are two keys, PGP uses asymmetric key encryption, sometimes
known as public key encryption.
Chapter 14: Security Architecture
and聽Design
1. B. The Biba security model covers data integrity. While other models cover confidentiality,
none of them cover availability.
2. D. An n-tier application, sometimes called a multitier application, can have as many tiers
as necessary. While you may think there are three, there could be more tiers than that,
depending on how the application is designed.
3. C. JavaScript Object Notation (JSON) uses keys and values to store data. While you could
theoretically represent a relational database in JSON, it wouldn鈥檛 be the most efficient. SQL
is a language used to query relational databases, and document-based databases may be
more likely to use other document types to store data.
4. C. The NIST cybersecurity framework specifies five functions: identify, protect, detect,
response, recover.
5. C. The ISO 27001 specification takes a different approach than NIST鈥檚 cybersecurity
framework. ISO 27001 specifies Plan, Do, Act, Check, which is four steps.
6. A. The highest level of classification used by the US government is top secret. Confidential
and restricted are lower levels, and eyes only is not a classification used by the U.S.
government.
7. D. Micro Channel architecture is a specification for peripherals to interact with hardware
systems that was proposed and implemented by IBM in the 1990s. Service-oriented
architecture is an older concept that has been revived, to a degree, by microservices. The
other answers are not things that exist.
8. C. Infrastructure as a service is a cloud-based offering where companies may just acquire
servers they can use for their infrastructure. Service oriented is a way of potentially
designing applications. Everything in AWS is virtualized. This leaves serverless. Lambda
functions don鈥檛 require the provisioning of servers to support them. All processing of the
function and its data is handled by AWS infrastructure.
9. C. The Clark-Wilson Integrity Model specifies Constrained Data Items (CDIs) and
Unconstrained Data Items (UDIs) that are used when identifying and implementing rules.
The other answers either don鈥檛 exist or refer to things that are not related to information
security.
10. D. Emulation is where applications may be run on a processor they were not compiled
for so the operation codes are emulated. AWS is Amazon Web Services, which can
offer application virtualization services but is not a type of application virtualization.
Paravirtualization is partial virtualization. Containers are a way of isolating applications
without using full virtual machines on a hypervisor.
11. A. The Five Functions designated by NIST are Identify, Protect, Detect, Respond, and
Recover. You can鈥檛 do any of the other functions until you have been through Identify,
which defines business needs and essential assets for the business.
12. D. Commonly, you will see the following in an n-tier application design as core features:
browser, application server, database server. There may also be security functions and load
balancers as well as a web server in front of the application server. When you focus just on
the core, though, the application server is in the middle of the architecture.
13. B. MongoDB is a NoSQL server that is not relational. SQL Server is ambiguous but could
refer to Microsoft SQL Server, which is not open-source. Oracle is a company that owns
relational database servers, including MySQL, but only MySQL is open-source.
14. C. The Bell-LaPadula Simple Security Property says a subject cannot read an object at a
higher level than the subject. None of the other answers are correct.
15. D. Some of the answers here mingle the five functions from NIST with the phases of the
ISO 27001 cycle. The only option that has only ISO 27001 phases is D, and those are Plan,
Do, Check, and Act.