a. 1 only
b. 2 only
c. 1 and 2
d. 3 and 4
105. d. A protection profile (PP) is typically used as part of a requirement specification, part of a regulation from a specific regulatory entity, or a baseline defined by a group of IT developers. Three roles that a PP should not fulfill include a detailed specification, a complete specification and a specification of a single product.
106. Regarding Common Criteria (CC), the outcome of a target of evaluation (TOE) leads to which of the following?
1. Objective results
2. Repeatable results
3. Defensible results
4. Evidential results
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
106. d. The target of evaluation (TOE) in the Common Criteria (CC) leads to objective and repeatable results that are defensible and can be cited as evidence.
107. Regarding Common Criteria (CC), reference monitor concept is applied to enforce which of the following?
a. Security Target (ST)
b. Target of Evaluations (TOE)
c. Protection Profile (PP)
d. System Specifications
107. b. Reference monitor concept is an access control concept referring to an abstract machine that mediates all accesses to objects by subjects. It is applied to enforce target of evaluations (TOE) access control policies during the design of TOE. The Common Criteria (CC) contains criteria to be used by evaluators when forming judgments about the conformance of TOEs to their security requirements. The CC describes the set of general actions the evaluator is to carry out but does not specify procedures to be followed in carrying out those actions.
A protection profile (PP) is a template for a security target (ST). Whereas a ST always describes a specific TOE (e.g., firewall v18.5), a PP is intended to describe a TOE type (e.g., firewall). A PP is an implementation-independent statement of security needs for a product type and a ST is an implementation-dependent construct. The ST may be based on one or more PPs. System specifications refer to the roles that a ST or PP should or should not fulfill.
108. What is a communication channel that enables a process to transfer information in a manner that violates the system’s security policy called?
a. Communication channel
b. Covert channel
c. Exploitable channel
d. Overt channel
108. b. This is the definition of a covert channel. A communication channel is the physical media and device that provides the means for transmitting information from one component of a network to other components. An exploitable channel is usable or detectable by subjects external to the Trusted Computing Base (TCB). An overt channel is a path within a network designed for the authorized transfer of data. This is in contrast to a covert channel.
109. Perimeter-based network security technologies such as firewalls are inadequate to protect service-oriented architectures (SOAs) providing Web services due to which of the following reasons?
1. Transport layer security (TLS)
2. Hypertext transfer protocol (HTTP)
3. Simple object access protocol (SOAP)
4. Reverse SOAP
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 1, 2, 3, and 4
109. d. Perimeter-based network security technologies (e.g., firewalls) are inadequate to protect SOAs for the following reasons:
The Transport Layer Security (TLS), which is used to authenticate and encrypt Web-based messages, is inadequate for protecting SOAP messages because it is designed to operate between two endpoints. TLS cannot accommodate Web services’ inherent capability to forward messages to multiple other Web services simultaneously.
SOAP is transmitted over Hypertext Transfer Protocol (HTTP), which is allowed to flow without restriction through most firewalls. Application-aware firewalls in the form of HTTP proxies for HTTP-based traffic allow organizations to limit what an application-layer protocol can and cannot do.
Because SOAP travels over HTTP, it is traditionally left open for Web traffic at perimeter firewalls. Additionally, with the Reverse SOAP (PAOS) specification, SOAP messages can pass through firewalls that limit incoming HTTP traffic but allow outgoing HTTP traffic. Some firewalls have begun to support blocking or allowing SOAP requests based on the source or destination of the request, but more robust and intelligent firewalls are needed to defend networks against malicious SOAP attacks.
SOAs are dynamic and can seldom be fully constrained to the physical boundaries of a single network.
110. Which of the following cannot protect simple object access protocol (SOAP) messages in a service-oriented architecture (SOA) providing Web services?
a. XML encryption
b. XML gateway
c. XML signature
d. XML parser
110. d. Ensuring the security of Web services involves augmenting traditional security mechanisms with security frameworks based on use of authentication, authorization, confidentiality, and integrity mechanisms. This augmentation includes the use of XML encryption, XML gateways, and XML signature, which are countermeasures. It is always beneficial to implement defense-in-depth using XML gateways at the perimeter along with WS-Security or HTTPS for all internal Web services.
XML parsers are often the target attacks because they are the first portion of a Web service that processes input from other Web services. Poorly designed or configured XML parsers can be used to compromise the parser regardless of how secure the Web service is.
111. Which of the following are used to perform data inferences?
a. Memory and CPU channels
b. Exploitable and detectable channels
c. Storage and timing channels
d. Buffer and overt channels
111. c. Sensitive information can be inferred by correlating data on storage media or observing timing effects of certain operations. Storage and timing channels are part of covert channels, where an unauthorized communications path is used to transfer information in a manner that violates a security policy. An exploitable channel is usable or detectable by subjects external to the Trusted Computing Base (TCB). An overt channel is a path within a network designed for the authorized transfer of data. Memory, CPU, and buffer channels are distracters.
112. The Web service processing model securing simple object access control protocol (SOAP) messages and extensible markup language (XML) documents does not deal with which of the following?
a. Chain of auctioneers
b. Chain of providers
c. Chain of intermediaries
d. Chain of consumers
112. a. An electronic auction (e-auction) market taking place on the Internet deals with a chain of auctioneers, not in Web services.
The other three choices deal with the Web services. The Web service processing model requires the ability to secure simple object access protocol (SOAP) messages and extensible markup language (XML) documents as they are forwarded along potentially long and complex chains of consumer, provider, and intermediary services. The nature of Web services processing makes those services subject to unique attacks, as well as variations on familiar attacks targeting Web servers.