CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 9

• 37 The component in a computer where program instructions are executed is called the:
• 38 A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:
• 39 The TCSEC system evaluation criteria is used to evaluate systems of what type:
• 40 A source code review uncovered the existence of instructions that permit the user to bypass security controls. What was discovered in the code review?
• 41 A hidden means of communication between two systems has been discovered. This is known as:

• 37 The component in a computer where program instructions are executed is called the:

• 38 A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is:

• 39 The TCSEC system evaluation criteria is used to evaluate systems of what type:

• 40 A source code review uncovered the existence of instructions that permit the user to bypass security controls. What was discovered in the code review?

• 41 A hidden means of communication between two systems has been discovered. This is known as: