Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
practice questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
What sort of rating is used inside the Common Criteria framework?
Correct
The Common Criteria employments a distinctive affirmation rating framework than the already used criteria. It has bundles of determinations that must be met for an item to get the corresponding rating. These appraisals and bundles are called Assessment Affirmation Levels. Once an item accomplishes any sort of rating, clients can see this information on an Evaluated Products List.
Incorrect
The Common Criteria employments a distinctive affirmation rating framework than the already used criteria. It has bundles of determinations that must be met for an item to get the corresponding rating. These appraisals and bundles are called Assessment Affirmation Levels. Once an item accomplishes any sort of rating, clients can see this information on an Evaluated Products List.
-
Question 2 of 10
2. Question
Which of the following may be a genuine explanation relating to memory addressing?
Correct
The physical memory addresses that the CPU employments are called supreme addresses. The indexed memory addresses that computer program employments are alluded to as coherent addresses. A relative address may be a consistent address that consolidates the properly balanced esteem.
Incorrect
The physical memory addresses that the CPU employments are called supreme addresses. The indexed memory addresses that computer program employments are alluded to as coherent addresses. A relative address may be a consistent address that consolidates the properly balanced esteem.
-
Question 3 of 10
3. Question
Pete may be a modern security director at a monetary institution that creates its claim internal software for particular exclusive usefulness. The budgetary institution has several locations disseminated all through the world and has bought a few person companies over the final ten a long time, each with its possess heterogeneous environment. Since each purchased company had its claim one-of-a-kind environment, it has been troublesome to create and deploy an internally created program in a viable way that meets all the fundamental business unit necessities. Which of the taking after best portrays a standard that Pete ought to ensure the computer program advancement group begins to actualize so that different trade needs can be met?
Correct
ISO/IEC/IEEE 42010 is a worldwide standard that traces determinations for system architecture systems and design dialects. It permits frameworks to be developed in a way that addresses all of the stakeholder’s concerns.
Incorrect
ISO/IEC/IEEE 42010 is a worldwide standard that traces determinations for system architecture systems and design dialects. It permits frameworks to be developed in a way that addresses all of the stakeholder’s concerns.
-
Question 4 of 10
4. Question
Which of the following is an erroneous portrayal relating to the common components that make up computer frameworks?
Correct
A processer sends a memory address and a “read” ask down an address transport. The system peruses information from that memory address and puts the asked information on the information transport. A CPU employments a program counter to keep track of the memory addresses containing the instruction sets it ought to handle in sequence. A stack pointer may be a component utilized within memory stack communication forms. An I/O transport is utilized by a fringe gadget
Incorrect
A processer sends a memory address and a “read” ask down an address transport. The system peruses information from that memory address and puts the asked information on the information transport. A CPU employments a program counter to keep track of the memory addresses containing the instruction sets it ought to handle in sequence. A stack pointer may be a component utilized within memory stack communication forms. An I/O transport is utilized by a fringe gadget
-
Question 5 of 10
5. Question
The check could be a security director who is mindful of obtaining modern computer systems for a co-location office his company is beginning up. The company has a few time-sensitive applications that require broad preparation capabilities. The co-location facility is not as huge as a most offices, so it can as it were fit a littler number of computers, which still must carry the same preparing stack as the systems within the main building. Which of the following best portrays the foremost critical angles of the items Stamp ought to purchase for these purposes?
Correct
When frameworks give topsy-turvy multiprocessing, this implies numerous CPUs can be used for preparing. Hilter kilter shows the capability of allotting particular applications to one CPU so that they don’t get to share computing capabilities with other competing processes, which increments execution. Since a little number of computers can fit in the new area, virtualization ought to be conveyed to permit a few distinctive frameworks to share the same physical computer stages.
Incorrect
When frameworks give topsy-turvy multiprocessing, this implies numerous CPUs can be used for preparing. Hilter kilter shows the capability of allotting particular applications to one CPU so that they don’t get to share computing capabilities with other competing processes, which increments execution. Since a little number of computers can fit in the new area, virtualization ought to be conveyed to permit a few distinctive frameworks to share the same physical computer stages.
-
Question 6 of 10
6. Question
Tom could be an unused security director who is responsible for investigating the current computer program that the company has created inside. He finds that a few of the program is obsolete, which causes execution and usefulness issues. During his testing methods he sees that when one program stops working, it negatively affects other programs on the same framework. He moreover finds out that as frameworks run over a period of a month, they begin to perform more gradually, but by rebooting the frameworks this issue goes away. Which of the following is best portrays a characteristic of the program that will be causing issues?
Correct
Agreeable multitasking implies that an engineer of an application should appropriately code his computer program to discharge framework assets when the application is wrapped up utilizing them, or the other software running on the framework may be adversely influenced. In this sort of situation, an application may be ineffectively coded and not discharge framework assets, which would negatively influence other programs running on the framework. In a preemptive multitasking environment, the working framework would have more control of framework asset allocation and give more security for these sorts of situations.
Incorrect
Agreeable multitasking implies that an engineer of an application should appropriately code his computer program to discharge framework assets when the application is wrapped up utilizing them, or the other software running on the framework may be adversely influenced. In this sort of situation, an application may be ineffectively coded and not discharge framework assets, which would negatively influence other programs running on the framework. In a preemptive multitasking environment, the working framework would have more control of framework asset allocation and give more security for these sorts of situations.
-
Question 7 of 10
7. Question
Tom could be an unused security director who is responsible for investigating the current computer program that the company has created inside. He finds that a few of the program is obsolete, which causes execution and usefulness issues. During his testing methods he sees that when one program stops working, it negatively affects other programs on the same framework. He moreover finds out that as frameworks run over a period of a month, they begin to perform more gradually, but by rebooting the frameworks this issue goes away. Which of the following is best portrays why rebooting makes a difference with framework execution in the situation depicted in this situation?
Correct
When the program is ineffectively composed, it might be apportioning memory and not properly releasing it. This will influence the execution of the total framework, since all software processes need to share a constrained supply of memory. When a framework is rebooted, the memory assignment develops is reset.
Incorrect
When the program is ineffectively composed, it might be apportioning memory and not properly releasing it. This will influence the execution of the total framework, since all software processes need to share a constrained supply of memory. When a framework is rebooted, the memory assignment develops is reset.
-
Question 8 of 10
8. Question
Steve has found out that the software product that his group submitted for assessment did not accomplish the genuine rating they were hoping for. He was befuddled almost this issue since the computer program passed the fundamental certification and accreditation forms sometime recently being sent. Steve was told that the framework permits unauthorized gadget drivers to be stacked which there was a key sequence that can be utilized to bypass the program to get to control security instruments. A few input Steve gotten from the item analyzers is that it ought to execute address space format randomization and data execution security. Which of the following is best depicts Steve’s confusion?
Correct
Assessment, certification, and accreditation are carried out by distinctive bunches with different purposes. Assessments are carried out by qualified third parties who utilize specific evaluation criteria (e.g., Common Criteria) to relegate an affirmation rating to a tried product. A certification handle could be a specialized survey commonly carried out inside an organization, and accreditation is management’s formal acknowledgment that’s carried out after the certification handle. A framework can be certified inside by a company and not pass an evaluation testing preparation since they are totally diverse things.
Incorrect
Assessment, certification, and accreditation are carried out by distinctive bunches with different purposes. Assessments are carried out by qualified third parties who utilize specific evaluation criteria (e.g., Common Criteria) to relegate an affirmation rating to a tried product. A certification handle could be a specialized survey commonly carried out inside an organization, and accreditation is management’s formal acknowledgment that’s carried out after the certification handle. A framework can be certified inside by a company and not pass an evaluation testing preparation since they are totally diverse things.
-
Question 9 of 10
9. Question
Steve pointed out that the software product submitted for review by his community did not receive the real ranking they were looking for. He was befuddled almost this issue since the computer program passed the fundamental certification and accreditation forms sometime recently being sent. Steve was told that the framework permits unauthorized gadget drivers to be stacked which there was a key sequence that can be utilized to bypass the program to get to control security instruments. A few input Steve gotten from the item analyzers is that it ought to execute address space format randomization and data execution security. Which of the following is best depicts a thing the program advancement group needs to address to guarantee that drivers cannot be stacked in an unauthorized way?
Correct
On the off chance that gadget drivers can be stacked despicably, at that point either the get-to-control rules outlined within the reference screen have to be moved forward upon or the current rules ought to be better upheld through the security bit forms. As it were authorized subjects ought to be able to introduce touchy computer program components that run inside the ring of a framework.
Incorrect
On the off chance that gadget drivers can be stacked despicably, at that point either the get-to-control rules outlined within the reference screen have to be moved forward upon or the current rules ought to be better upheld through the security bit forms. As it were authorized subjects ought to be able to introduce touchy computer program components that run inside the ring of a framework.
-
Question 10 of 10
10. Question
Steve pointed out that the software product submitted for review by his community did not receive the real ranking they were looking for. He was befuddled almost this issue since the computer program passed the fundamental certification and accreditation forms sometime recently being sent. Steve was told that the framework permits unauthorized gadget drivers to be stacked which there was a key sequence that can be utilized to bypass the program to get to control security instruments. A few input Steve gotten from the item analyzers is that it ought to execute address space format randomization and data execution security. Which of the following is best portrays a few of the issues that the assessment analyzers most likely ran into whereas testing the submitted item?
Correct
In case analyzers recommended to the group that addresses space format randomization and data execution security ought to be coordinated, typically most likely since the framework permits for malicious code to effortlessly execute in memory segments that would be perilous to the system. These are both memory assurance approaches.
Incorrect
In case analyzers recommended to the group that addresses space format randomization and data execution security ought to be coordinated, typically most likely since the framework permits for malicious code to effortlessly execute in memory segments that would be perilous to the system. These are both memory assurance approaches.