CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 6

• 34 Provided it is permitted by local fire codes, which type of fire sprinkler system is most preferred for computer rooms? • 35 • The innermost portion of an operating system is known as: 36 A security nalyst has a system evaluation criteria manual called the “Orange Book”. This is a part of: • 37 The component in a computer where program instructions are executed is called the: • 38 A resource server contains an access control system. When a user requests access to an object, the system examines the permission settings for the object and the permission settings for the user, and then makes a decision whether the user may access the object. The access control model that most closely resembles this is: • 39 The TCSEC system evaluation criteria is used to evaluate systems of what type: • 40 A source code review uncovered the existence of instructions that permit the user to bypass security controls. What was discovered in the code review? • 41 A hidden means of communication between two systems has been discovered. This is known as: