Exam 13: Trusted Computing and Multilevel Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A _______ is a collection of requirements that share a common focus or intent.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
The ________ access mode allows the subject only write access to the object.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Security classes are referred to as __________.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.
(Multiple Choice)
4.8/5
(36)
In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.
(Short Answer)
4.7/5
(36)
_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.
(Multiple Choice)
4.7/5
(32)
The BLP model includes a set of rules based on abstract operations that
change the state of the system.
(True/False)
4.8/5
(29)
The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.
(Short Answer)
4.8/5
(38)
_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.
(Short Answer)
4.9/5
(42)
An object is said to have a security clearance of a given level.
(True/False)
4.8/5
(33)
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .
(Multiple Choice)
4.9/5
(31)
Problems with providing strong computer security involve only the design
phase.
(True/False)
4.8/5
(39)
The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.
(Short Answer)
4.9/5
(34)
The Biba models deals with confidentiality and is concerned with
unauthorized disclosure of information.
(True/False)
4.8/5
(32)
The addition of multilevel security to a database system does not increase
the complexity of the access control function.
(True/False)
4.8/5
(41)
A subject is said to have a security _________ of a given level.
(Short Answer)
4.8/5
(30)
One of the most influential computer security models is the Bell-LaPadula
model.
(True/False)
4.9/5
(33)
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
(Short Answer)
4.8/5
(40)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)