- You have three applications running on a single-core, single-processor system that supports multitasking. One of those applications is a word processing program that is managing two threads simultaneously. The other two applications are using only one thread of execution. How many application threads are running on the processor at any given time?
(a) One
(b) Two
(c) Three
(d) Four
Answer:
(a)
Explanation:
A good example of reading the question! There are four threads in total, but a system with only one single-core processor can only physically run one thread at a time.
- What type of federal government computing system requires that all individuals accessing the system have a need-to-know for all the information processed by the system?
(a) Dedicated
(b) System high
(c) Compartmented
(d) Multilevel
Answer:
(a)
- What is the most effecitive means of reducing the risk of losing the data on a mobile device, such as a notebook computer?
(a) Defining a strong logon password
(b) Minimising sensitive data stored on the mobile device
(c) Using a cable lock
(d) Encrypting the hard drive
Answer:
(b)
- What type of electrical component serves as the building block for dynamic RAM chips?
(a) Capacitor
(b) Resistor
(c) Flip-flop
(d) Transistor
Answer:
(a)
Explanation:
(c) Flip-flops are used in static RAM (SRAM).
- In which of the following security nodes can you be assured that all users have access permissions for all information processed by the system, but not necessarily need-to-know for all the information?
(a) Dedicated
(b) System high
(c) Compartmented
(d) Multilevel
- Which of the following is a layer of the ring protection scheme that is not normally implemented in practice?
(a) Layer 0
(b) Layer 1
(c) Layer 3
(d) Layer 4
Answer:
(b)
Explanation:
The ring model is numbered from 0-3. Ring 0 contains the security kernel. Ring 1 & 2 contain device drivers but are not normally implemented in practice. Ring 3 contains user applications. Ring 4 does not exist!
- What is the most common form of perimeter security device or mechanism?
(a) Security guards
(b) Fences
(c) CCTV
(d) Lighting
Answer:
(d)
- What is the most common & inexpensive form of physical access control device?
(a) Lighting
(b) Security guard
(c) Key locks
(d) Fences
Answer:
(c)
- What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object?
(a) Wave
(b) Photoelectric
(c) Heat
(d) Capacitance
Answer:
(d)
- No matter what form of physical access control is used, a security guard or other monitoring system may be deployed to prevent all but which of the following?
(a) Piggybacking
(b) Espionage
(c) Masquerading
(d) Abuse
Answer:
(b)
Explanation:
Espionage cannot be prevented by physical access controls
- Which of the following is NOT a disadvantage of using security guards?
(a) Security guards are usually unaware of the scope of the operations within a facility.
(b) Not all environments & facilities support security guards
(c) Not all security guards are themselves reliable
(d) Prescreening, bonding & training do not guarantee effective and reliable security guards
Answer:
(a)
Explanation:
Security guards are usually unaware of the scope of the operations within a facility, which supports confidentiality of those operations and thus helps reduce the possibility that a security guard will be involved in the disclosure of confidential information.