CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 6
•
34
Provided it is permitted by local fire codes, which
type of fire sprinkler system is most preferred for computer
rooms?
•
35
•
The innermost portion of an operating system is
known as:
36
A security nalyst has a system evaluation criteria
manual called the “Orange Book”. This is a part of:
•
37 The component in a computer where program
instructions are executed is called the:
•
38
A resource server contains an access control
system. When a user requests access to an object, the system
examines the permission settings for the object and the
permission settings for the user, and then makes a decision
whether the user may access the object. The access control
model that most closely resembles this is:
•
39
The TCSEC system evaluation criteria is used to
evaluate systems of what type:
• 40
A source code review uncovered the existence of
instructions that permit the user to bypass security controls.
What was discovered in the code review?
• 41
A hidden means of communication between two
systems has been discovered. This is known as: