Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 (1 point) A federal agency is preparing a Common Criteria protection

ID: 3556550 • Letter: Q

Question

Question 1 (1 point)

A federal agency is preparing a Common Criteria protection profile for cloud computing services. Which of the following would not be included?

Question 1 options:

a. confidentiality criteria

b. authentication criteria

c. nonrepudiation criteria

d. cost criteria

Question 2 (1 point)

Which type of evaluation would you use to identify sources for security technologies that are compatible with a new mobile computing device?

Question 2 options:

a. TAM

b. AoA

c. technology scan

d. experiment

Question 3 (1 point)

Which evaluation strategy could you use to test a computer system's resistance to cyber attacks?

Question 3 options:

a. TAM

b. experiment

c. AoA

d. CBA

Question 4 (1 point)

A cost/benefit ratio is an example of a measure that can be used in a _______ study.

Question 4 options:

a. quantitative

b. qualitative

c. hybrid

d. all of the above

Question 5 (1 point)

Which of the following would be found in the report of a TAM study of a pilot test of a new biometric device?

Question 5 options:

a. quotes from users about the device

b. copies of invoices documenting costs

c. charts showing numbers and types of help desk calls

d. A and C

Question 6 (5 points)

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system. Type your answer into the box below.

a. confidentiality criteria

b. authentication criteria

c. nonrepudiation criteria

d. cost criteria

Explanation / Answer

1) c. nonrepudiation criteria

2) b. AoA

3) d. CBA

4) c. hybrid

5) c. charts showing numbers and types of help desk calls

----------100% correct answer