Exam 13: Security Standards

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which is a security model originally designed in anticipation of United States military applications?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

To what does the "Discretionary Protection" category refer?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Which is a security model using the concepts of subjects,objects,and programs?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

What level of protection is available in IBM OS\400,Windows XP,and Novell Netware?

(Multiple Choice)
4.8/5
(38)

The DoD security categories range from minimal protection to ____________ protection.

(Short Answer)
4.7/5
(30)

The ____________ is a collection of color-coded books on information security.

(Short Answer)
4.7/5
(37)

The purpose of the ____________ Model is to prevent information flow that can cause conflict of interest.

(Short Answer)
4.7/5
(38)

Although the ____________ Model is similar to the Bell-LaPadula Model,it also has additional applications.

(Short Answer)
5.0/5
(40)

To what does the term trusted computing base refer?

(Multiple Choice)
4.9/5
(38)

Who publishes a series of color-coded books on information security?

(Multiple Choice)
4.8/5
(36)

What is the common name given to one of a series of color-coded books that outlines criteria for rating various operating systems?

(Multiple Choice)
4.8/5
(29)

Which variation of the Unix operating system provides the higher security level?

(Multiple Choice)
4.9/5
(42)

What division designation is given to a system with a classification so low it is not rated?

(Multiple Choice)
4.8/5
(44)

The ____________ is a perhaps the best known of a series of color-coded books on information security.

(Short Answer)
4.9/5
(34)

What is the purpose of the concept of "separation of duties" as used in some security models?

(Multiple Choice)
4.8/5
(35)

Of the following,which has the highest security level?

(Multiple Choice)
4.8/5
(35)

Operating systems such as HP-UX BLS,Cray Research Trusted Unicos 8.0,and Digital SEVMS all are within which security division?

(Multiple Choice)
4.7/5
(30)

Which was NOT part of the origins of the Common Criteria?

(Multiple Choice)
4.9/5
(25)

The ____________ is the result of combining three existing standards.

(Short Answer)
4.8/5
(33)

One security division contains ____________ categories so named because such operating systems have yet to be developed.

(Short Answer)
4.7/5
(41)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)