Domain 2 – Asset Security and Domain 3 – Security Engineering/Security Architecture Design
Part 1.
- What is data remanence? Describe the four different approaches to eliminating data remanence: overwriting, degaussing, encryption, and physical destruction.
- Describe what data leak prevention (DLP) is and compare the benefits and drawbacks of network DLP, endpoint DLP, and hybrid DLP.
Part 2
- Describe the difference between the Biba Integrity Model and the Clark-Wilson Integrity Model. Give an overview of the Bell LaPadula Confidentiality.
- In your own words, describe the concept of ring protection. What is the difference between Layering and data hiding?
- Describe the different components addressed within the Common Criteria used for evaluation of the security elements within a system. What is the difference between certification and accreditation of a system?.
- Define cloud computing and describe the differences between Software as as Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Define parallel computing and describe bit-level parallelism, instruction-level parallelism, task-level parallelism, and data parallelism.