Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
The service-oriented modeling framework (SOMF) has been proposed by author Michael Bell as a service-oriented modeling language for
software development that employs disciplines and a holistic language to provide strategic solutions to enterprise problems.
The service-oriented modeling framework (SOMF) is a service-oriented development life cycle methodology. It offers a number of modeling
practices and disciplines that contribute to a successful service-oriented life cycle management and modeling. The service-oriented modeling
framework illustrates the major elements that identify the 'what to do' aspects of a service development scheme.
Answer B is incorrect. The service-oriented architecture (SOA) is a flexible set of design principles used during the phases of systems
development and integration.
Answer D is incorrect. The service-oriented modeling and architecture (SOMA) includes an analysis and design method that extends
traditional object-oriented and component-based analysis and design methods to include concerns relevant to and supporting SOA.
Answer C is incorrect. SABSA (Sherwood Applied Business Security Architecture) is a framework and methodology for Enterprise Security
Architecture and Service Management. It is a model and a methodology for developing risk-driven enterprise information security architectures
and for delivering security infrastructure solutions that support critical business initiatives.
Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules
designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may
not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?
NIST has developed a suite of documents for conducting Certification & Accreditation (C&A). These documents are as follows:
NIST Special Publication 800-37: This document is a guide for the security certification and accreditation of Federal Information
Systems.
NIST Special Publication 800-53: This document provides a guideline for security controls for Federal Information Systems.
NIST Special Publication 800-53A. This document consists of techniques and procedures for verifying the effectiveness of security
controls in Federal Information System.
NIST Special Publication 800-59: This document is a guideline for identifying an information system as a National Security System.
NIST Special Publication 800-60: This document is a guide for mapping types of information and information systems to security
objectives and risk levels.
Which of the following are the levels of public or commercial data classification system?
Each correct answer represents a complete solution. Choose all that apply.
The public or commercial data classification is also built upon a four-level model, which are as follows:
Public
Sensitive
Private
Confidential
Each level (top to bottom) represents an increasing level of sensitivity.
The public level is similar to unclassified level military classification system. This level of data should not cause any damage if disclosed.
Sensitive is a higher level of classification than public level data. This level of data requires a greater level of protection to maintain
confidentiality.
The Private level of data is intended for company use only. Disclosure of this level of data can damage the company.
The Confidential level of data is considered very sensitive and is intended for internal use only. Disclosure of this level of data can cause
serious damage to the company.
Answer C and E are incorrect. Unclassified and secret are the levels of military data classification.
Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?
An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or
disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by
crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic. An intrusion detection
system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes
network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation,
unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).
Answer D is incorrect. Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets or network traffic by
controlling whether routed packets are forwarded or blocked at the router's interfaces. According to the criteria specified within the access
lists, router determines whether the packets to be forwarded or dropped. Access control list criteria could be the source or destination
address of the traffic or other information. The types of Cisco ACLs are Standard IP, Extended IP, IPX, Appletalk, etc.
Answer B is incorrect. Internet Protocol Security (IPSec) is a method of securing data. It secures traffic by using encryption and digital
signing. It enhances the security of data as if an IPSec packet is captured, its contents cannot be read. IPSec also provides sender verification
that ensures the certainty of the datagram's origin to the receiver.
Answer A is incorrect. Direct-attached storage (DAS) is a digital storage system that is directly attached to a server or workstation,
without using a storage network.
Cammy
2 days agoIzetta
9 days agoDalene
22 days agoLouvenia
30 days agoLuisa
1 month agoEdna
1 month agoHannah
2 months agoFelicia
2 months agoCharlene
2 months agoTegan
2 months agoWillow
3 months agoValentine
3 months agoJunita
3 months agoKaycee
3 months agoDelila
4 months agoTegan
4 months agoLeanna
4 months agoTammi
4 months agoLeana
5 months agoMerlyn
5 months agoMoira
5 months agoLachelle
6 months agoRosenda
6 months agoMarilynn
6 months agoRutha
6 months agoArlette
9 months agoCamellia
11 months agoDortha
12 months agoRodrigo
1 year agoGarry
1 year agoRonny
1 year agoParis
1 year agoAja
1 year agoLazaro
1 year agoTawanna
1 year agoCarissa
1 year agoWynell
1 year agoMabelle
1 year agoAshley
1 year agoShenika
1 year agoNicolette
1 year agoTerina
1 year agoDustin
1 year agoMarylin
1 year agoDulce
1 year agoCarmela
2 years agoLeah
2 years agoErinn
2 years agoLarue
2 years agoRochell
2 years agoElli
2 years ago