Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

INFA610 Quiz Short Answers and Detailed Questions

INFA610 Quiz Short Answers and Detailed Questions

INFA610 Quiz Short Answers and Detailed Questions

Short Answer or Fill-In: (2 points each)

1. ________ is a set of circumstances that has the potential to cause loss or harm.
2. ____________ is an access control mechanism that is based on two sets of attributes—one set of attributes associated with the current domain of execution of a subject and the other set of attributes is associated with an object.
3. The ________ model is a lattice-based formal model for confidentiality, and it continues to be the dominant security policy model even today.
4. The _________ model is an integrity policy model that is a dual of the Bell-LaPadula model in that it inverts the dominance relation.
5. A __________ computer system is a system that employs sufficient hardware and software assurance techniques to allow it to process information at multiple security levels.
6. Which security model is most useful for preventing the contamination of data?
7. __________ is a protective measure that is an action, device, procedure, or _________ that removes or minimizes risk or its impact.
8. The fundamental security design principles include fail-safe defaults, complete mediation, open design, isolation, _________, __________, ___________, and _____________.
9. A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.
10. The _________________ security model is an information flow model used to implement dynamically changing access permissions.

Questions (5 points each)

11. Explain the Trusted Computing Base (TCB). What does it maintain? What basic functions are monitored by the TCB?
12. What is information security? What is information assurance? What is the difference between the two terms?
13. Explain the relationship between a threat, a risk, and a countermeasure.
14. What is the function of the Reference Monitor?
15. What are the guiding principles of the Reference Validation Mechanism?
16. Define and provide examples of the three core aspects of information security.

Course: INFA 610 Foundations of Information Security and Assurance
School: University of Maryland University College

  • : 09/06/2017
  • : 20

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Sight Writers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Sight Writers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Sight Writers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Sight Writers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.