60. Which of the following is
a.
Prohibiting more than two-levels of embeddingb.
Facilitating policy decisions on source and destinationc.
Prohibiting the transfer of archived informationd.
Limiting embedded components within other components61. Which of the following are the ways to reduce the range of potential malicious content when transferring information between different security domains?
1.
Constrain file lengths2.
Constrain character sets3.
Constrain schemas4.
Constrain data structuresa.
1 and 3b.
2 and 3c.
3 and 4d.
1, 2, 3, and 462. Which of the following
a.
Implementing one-way flowsb.
Checking information for malwarec.
Implementing dirty word list searchesd.
Applying security attributes to metadataThe other three choices do detect unsanctioned information and prohibit the transfer with actions such as checking all transferred information for malware, implementing dirty word list searches on transferred information, and applying security attributes to metadata that are similar to information payloads.
63. Which of the following binds security attributes to information to facilitate information flow policy enforcement?
a.
Security labelsb.
Resolution labelsc.
Header labelsd.
File labels64. Which of the following access enforcement mechanisms provides increased information security for an organization?
a.
Access control listsb.
Business application systemc.
Access control matricesd.
Cryptography65. What do architectural security solutions to enforce security policies about information on interconnected systems include?
1.
Implementing access-only mechanisms2.
Implementing one-way transfer mechanisms3.
Employing hardware mechanisms to provide unitary flow directions4.
Implementing regrading mechanisms to reassign security attributesa.
1 onlyb.
2 onlyc.
3 onlyd.
1, 2, 3, and 466. From an access control point of view, separation of duty is of two types: static and dynamic. Which of the following are examples of static separation of duties?
1.
Role-based access control2.
Workflow policy3.
Rule-based access control