Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _______ is a collection of requirements that share a common focus or intent.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

The ________ access mode allows the subject only write access to the object.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

Security classes are referred to as __________.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.

(Multiple Choice)
4.8/5
(36)

In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.

(Short Answer)
4.7/5
(36)

_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.

(Multiple Choice)
4.7/5
(32)

The BLP model includes a set of rules based on abstract operations that change the state of the system.

(True/False)
4.8/5
(29)

The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.

(Short Answer)
4.8/5
(38)

_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.

(Short Answer)
4.9/5
(42)

"No read up" is also referred to as the _________ property.

(Short Answer)
4.8/5
(39)

An object is said to have a security clearance of a given level.

(True/False)
4.8/5
(33)

Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .

(Multiple Choice)
4.9/5
(31)

Problems with providing strong computer security involve only the design phase.

(True/False)
4.8/5
(39)

The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.

(Short Answer)
4.9/5
(34)

The Biba models deals with confidentiality and is concerned with unauthorized disclosure of information.

(True/False)
4.8/5
(32)

The addition of multilevel security to a database system does not increase the complexity of the access control function.

(True/False)
4.8/5
(41)

A subject is said to have a security _________ of a given level.

(Short Answer)
4.8/5
(30)

One of the most influential computer security models is the Bell-LaPadula model.

(True/False)
4.9/5
(33)

When multiple categories or levels of data are defined,the requirement is referred to as __________ security.

(Short Answer)
4.8/5
(40)

"No write down" is also referred to as the *-property.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)