Chapter 12 ■ Practice Test 4 305
- In the diagram shown here of security boundaries within a computer system, what compo-
nent’s name has been replaced with XXX?
User Space
Process Process
Reference
Monitor
TCB
XXX
Process
A. Kernel
B. Privileged core
C. User monitor
D. Security perimeter
- Val is attempting to review security logs but is overwhelmed by the sheer volume of
records maintained in her organization’s central log repository. What technique can she
use to select a representative set of records for further review?
A. Statistical sampling.
B. Clipping.
C. Choose the first 5% of records from each day.
D. Choose 5% of records from the middle of the day. - In Jen’s job as the network administrator for an industrial production facility, she is tasked
with ensuring that the network is not susceptible to electromagnetic interference due to
the large motors and other devices running on the production floor. What type of network
cabling should she choose if this concern is more important than cost and difficulty of
installation?
A. 10Base2
B. 100BaseT
C. 1000BaseT
D. Fiber-optic