Concepts
Concepts
Concepts and Requirements
Requirements
Requirements
100

Which of the following is not a valid authentication factor or mechanism?

  1. Something you have

  2. Someone you know

  3. Somewhere you are

  4. All of the above

B. Someone you know is incorrect; something you know is a valid factor.

100

Which access control mechanism provides the owner of an object the opportunity to determine the access control permissions for other subjects?

  1. Mandatory

  2. Role-based

  3. Discretionary

  4. Token-based


C. This is the definition of discretionary access control.

100

Logging is a key element of what?

  1. Accountability

  2. Access control

  3. Integrity

  4. Authorization

A. Accounting is a means of measuring activity. Accountability is the recording of actions and the users performing them. In IT systems, this can be done by logging crucial elements of activity as they occur.

100

Functional requirements include all of the following except what?

  1. Determining specific architecture details

  2. Deployment platform considerations

  3. DR/BCP requirements

  4. Security requirements

A. The specific architecture details come from requirements but are not specified directly as functional requirements.

100

Which of the following would not be considered structured data?

  1. Excel spreadsheet of parts prices

  2. Oracle database of customer orders

  3. XML file of parts and descriptions

  4. Log file of VPN failures

A. Microsoft Office files are considered unstructured data.


200

What is the concept of preventing a subject from denying a previous action with an object in a system?

  1. Identity

  2. Nonrepudiation

  3. Authorization

  4. Auditing

B. This is the definition of nonrepudiation.

200

Which access control technique relies on a set of rules to determine whether access to an object will be granted or not?

  1. Role-based access control

  2. Object and rule instantiation access control

  3. Rule-based access control

  4. Discretionary access control

C. This is a description of rule-based access control.

Bonus points if you can describe Mandatory Access Control (+50), Role-based access control (+50) and Discretionary access control (+50)

200

If one desires nonrepudiation with respect to an event performed by a user, which of the following is/are required?

  1. Authentication

  2. Authorization

  3. Auditing

  4. All the above

D. Nonrepudiation is the concept of preventing a subject from denying a previous action with an object in a system. When authentication, authorization, and auditing are properly configured, the ability to prevent repudiation by a specific subject with respect to an action and an object is ensured.


200

Access control lists are assigned to __________ as part of a security scheme.

  1. Users

  2. Roles

  3. Objects

  4. Activities

C. Access control lists are associated with users, objects, and activities, but are assigned to objects.

200

Presenting a known attack methodology to the development team to ensure appropriate mitigation can be done via what?

  1. Use case

  2. Misuse case

  3. Security requirement

  4. Business requirement

B. Misuse cases can present commonly known attack scenarios and are designed to facilitate communication among designers, developers, and testers to ensure that potential security holes are managed in a proactive manner.

300

Using the principle of keeping things simple is related to what?

  1. Layered security

  2. Simple Security Rule

  3. Economy of mechanism

  4. Implementing least privilege for access control

C. The principle of economy of mechanism states that complexity should be limited to make security manageable; in other words, keep things simple.

Bonus Points if you can describe Layered Security (+50), Simple Security Rule (+50) and implementing least privilege for access control (+50)

300

Open design places the focus of security efforts on what?

  1. Open-source software components

  2. Hiding key elements (security through obscurity)

  3. Proprietary algorithms

  4. Producing a security mechanism in which its strength is independent of its design

D. Open design states that the security of a system must be independent from its design. In essence, the algorithm that is used will be open and accessible, and the security must not be dependent upon the design, but rather on an element such as a key.

300

Supply chains commonly include which of the following as part a set of requirements?

  1. Testing regimes

  2. Source code control

  3. Encryption

  4. All of the above

D. Common supply chain contract requirements include specific security requirements such as connections to external systems, input validation and encoding, authentication and session management, access control, logging, error handling, secure configuration, encryption, availability, libraries, testing procedures, and bug remediation processes, as well as general security issues such as source code control including revision control and code escrow.

300

Use cases should be constructed for what?

  1. All requirements

  2. All requirements that have security concerns

  3. Business requirements that are poorly defined

  4. Implementation features that need testing

C. Use cases are specifically well suited for business requirements that are not well defined.

300

What party is responsible for defining data classification?

  1. Data custodian

  2. Senior manager (CIO)

  3. Security management

  4. Data owner

D. Data owners are responsible for defining data classification.


400

Version Control

Also known as revision control or source control systems. A reference to software tools that are used by software development teams to manage the access and the changes to source code over time.

400

Malware

Malicious software such as viruses, worms, or Trojans.

400

NIST

National Institute of Standards and Technology

The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness.  

400

What party determines which users or groups should have access to specific data elements?

  1. Data custodian

  2. Data manager

  3. System administrator

  4. Data owner

D. The data owner is the party who determines who has specific levels of access associated with specific data elements.


400

The RTM tracks which of the following?

  1. Requirement description, failure modes, verification method(s), use cases

  2. Requirement source, test objective(s), verification method(s), known bugs

  3. Requirement description, test objective(s), verification method(s), use cases

  4. Requirement source, test objective(s), failure modes, use cases

RTM is the Requirements traceability matrix

C. The requirements traceability matrix tracks requirement description, test objective(s), verification method(s), use cases.

500

Asymmetric Algorithm 

A reference to cryptographic algorithms that rely on a mathematically related public-private key pair to perform encryption/decryption. Whichever key is used to encrypt a message, the other key must be used to decrypt the message. Aside from confidentiality, these algorithms may also be used for the purpose of key exchange and/or digital signatures.

500

Digital Signature

A reference to cryptographic operations that, when implemented correctly, can provide assurance for data integrity, origin, and nonrepudiation.

500

Data Custodian

A reference to a subject or entity with the responsibility to maintain the data and ensure that safeguards and countermeasures for data protection are implemented.

500

Security Requirements Traceability Matrix

A reference to a document that is created to link/map the requirements to test cases. This document may serve various purposes throughout the software lifecycle, but the primary objective is to provide forward and backward traceability to ensure that all defined requirements are tested.

500

Data Anonymization

The process of sanitizing data by removing personally identifiable information from the data sets for the purpose of privacy protection.