In an access validation error, the system is vulnerable because the access control mechanism is faulty. A configuration error occurs when user controllable settings in a system are set so that the system is vulnerable. Race condition error occurs when there is a delay between the time when a system checks to see if an operation is allowed by the security model and the time when the system actually performs the operation.
8. From a risk management viewpoint, new system interfaces are addressed in which of the following system development life cycle (SDLC) phases?
a.
Initiationb.
Development/acquisitionc.
Implementationd.
Operation/maintenance9. System assurance requires which of the following?
1.
Proof-of-origin2.
Proof-of-delivery3.
Techniques4.
Metricsa.
1 and 2b.
1 and 3c.
2 and 4d.
3 and 410. The initiation phase of the security certification and accreditation process does
a.
Preparationb.
Resource identificationc.
Action plan and milestonesd.
Security plan acceptanceThe other three choices are part of the initiation phase, which is the first phase, where it is too early to develop the action plan and milestones.
11. Which of the following comes first in the security certification and accreditation process of an information system?
a.
Security certificationb.
Security recertificationc.
Security accreditationd.
Security reaccreditationRecertification and reaccreditation occur periodically and sequentially whenever there is a significant change to the system or its operational environment as part of ongoing monitoring of security controls.
12. Which of the following security accreditation authority’s decision scenarios require justification for the decision?
1.
Full accreditation of the system2.
Accredit the system with conditions3.
Deny the system accreditation4.
Defer the system accreditationa.
1 onlyb.
2 onlyc.
1, 2, or 3d.
1, 2, 3, or 413. In the continuous monitoring phase of the security certification and accreditation process, ongoing assessment of security controls is based on which of the following?
a.
Configuration management documentsb.
Action plan and milestone documentsc.
Configuration control documentsd.
Security impact analyses documents