试卷名称:CISSP认证考试(安全体系结构和设计)模拟试卷1

上一题: Several types of read-only memory d...
下一题: The Information Technology Infrastr...
单项选择题

There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another process’s request until the I/O device is ready for more data?  

A.I/O using DMA

B.Interrupt-driven I/O

C.Programmable I/O

D.Premapped I/O

您可能感兴趣的题目

CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode? The user and application The program that is loaded into memory The operating system The CPU and user
Which of the following is a common association of the Clark-Wilson access model? Chinese Wall Access tuple Read up and write down rule Subject and application binding
John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of IT and business processes. Which of the following frameworks should he suggest? DoDAF CMMI ISO/IEC 42010 TOGAF
Which of the following best defines a virtual machine? A virtual instance of an operating system A piece of hardware that runs multiple operating system environments simultaneously A physical environment for multiple guests An environment that can be fully utilized while running legacy applications
Virtualization offers many benefits. Which of the following incorrectly describes virtualization? Virtualization simplifies operating system patching. Virtualization can be used to build a secure computing platform. Virtualization can provide fault and error containment. Virtual machines offer powerful debugging capabilities.
Which of the following is not a responsibility of the memory manager? Use complex controls to ensure integrity and confidentiality when processes need tp use the same shared memory segments. Limit processes to interact only with the memory segments assigned to them. Swap contents from RAM to the hard drive as needed. Run an algorithm to identify unused committed memory and inform the operating system that the memory is available.
Several types of read-only memory devices can be modified after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM? PROM can only be programmed once, while EEPROM can be programmed multiple times. A UV light is used to erase data on EEPROM, while onboard programming circuitry and signals erase data on EPROM. The process used to delete data on PROM erases one byte at a time, while to erase data on an EPROM chip, you must remove it from the hardware. The voltage used to write bits into the memory cells of EPROM burns out the fuses that connect individual memory cells, while UV light is used to write to the memory cells of PROM.
There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another process’s request until the I/O device is ready for more data? I/O using DMA Interrupt-driven I/O Programmable I/O Premapped I/O
There are several security enforcement components that are commonly built into operating systems. Which component is illustrated in the graphic that follows? [*] Virtual machines Interrupt Cache memory Protection rings
The following scenario applies to questions 28 and 29. Tim’s development team is designing a new operating system. One of the requirements of the new product is that critical memory segments need to be categorized as nonexecutable, with the goal of reducing malicious code from being able to execute instructions in privileged mode. The team also wants to make sure that attackers will have a difficult time predicting execution target addresses.
Certain types of attacks have been made more potent by which of the following advances to microprocessor technology? Increased circuits, cache memory, and multiprogramming Dual mode computation Direct memory access I/O Increases in processing power
Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage? More than one process uses the same resource. It allows cookies to remain persistent in memory. It allows for side-channel attacks to take place. Two processes can carry out a denial-of-service.
Which of the following correctly describes the relationship between the reference monitor and the security kernel? The security kernel implements and enforces the reference monitor. The reference monitor is the core of the trusted computing base, which is made up of the security kernel. The reference monitor implements and enforces the security kernel. The security kernel, aka abstract machine, implements the reference monitor concept.
The Zachman Architecture Framework is often used to set up an enterprise security architecture. Which of the following does not correctly describe the Zachman Framework? A two-dimensional model that uses communication interrogatives intersecting with different levels A security-oriented model that gives instructions in a modular fashion Used to build a robust enterprise architecture versus a technical security architecture Uses six perspectives to describe a holistic information infrastructure
Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establishes the type and intensity of the evaluation? Descriptive elements Evaluation assurance requirements Evaluation assurance level Security target
Which security architecture model defines how to securely develop access rights between subjects and objects? Brewer-Nash Clark-Wilson Graham-Denning Bell-LaPadula
There are several different important pieces to the Common Criteria. Which of the following best describes the first of the missing components? [*] Target of evaluation Protection profile Security target EALs
There are many different types of access control mechanisms that are commonly embedded into all operating systems. Which of the following is the mechanism that is missing in this graphic? [*] Trusted computing base Security perimeter Reference monitor Domain
Lacy’s manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compares their ratings. Which of the following are the evaluation criteria most in use today for these types of purposes? ITSEC Common Criteria Red Book Orange Book
The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive information. What function does the TCB initiate to ensure that this is done in a secure manner? I/O operational execution Process deactivation Execution domain switching Virtual memory to real memory mapping

相关试卷

  • CISSP认证考试模拟试卷4

  • CISSP认证考试模拟试卷3

  • CISSP认证考试模拟试卷2

  • CISSP认证考试模拟试卷1

  • CISSP认证考试(软件开发安全)模拟试卷1

  • CISSP认证考试(访问控制)模拟试卷1

  • CISSP认证考试(信息安全治理与风险管理)模拟试卷1

  • CISSP认证考试(通信安全与网络安全)模拟试卷1

  • CISSP认证考试(安全体系结构和设计)模拟试卷1

  • CISSP认证考试(密码学)模拟试卷1

  • CISSP认证考试(物理安全与环境安全)模拟试卷1

  • CISSP认证考试(法律、法规、调查与合规)模拟试卷1

  • CISSP认证考试(业务连续性和灾难恢复)模拟试卷1

  • CISSP认证考试(安全运营)模拟试卷1