1.
Which expert system operating mode allows determining if a given hypothesis is valid?
2.
Why does compiled code pose more of a security risk than interpreted code?
3.
Which software development model is actually a meta-model that incorporates a number of the software development models?
4.
Which of the following is used in database information security to hide information?
5.
Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?
6.
What is used to protect programs from all unauthorized modification or executional interference?
7.
What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?
8.
What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?
9.
Which of the following is an unintended communication path that is NOT protected by the system's normal security mechanisms?
10.
Which of the following is used to interrupt the opportunity to use or perform collusion to subvert operation for fraudulent purposes?