Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A component describes a specific set of security requirements.

(True/False)
4.8/5
(33)

A multilevel secure system for confidentiality must enforce:

(Multiple Choice)
4.9/5
(32)

An entire database such as a financial or personnel database cannot be maintained on a server with other files and still be classified as confidential or restricted.

(True/False)
4.9/5
(36)

The ________ control the manner by which a subject may access an object.

(Multiple Choice)
4.8/5
(36)

_________ rules are security policy restrictions on the behavior of IVPs and TPs.

(Short Answer)
4.7/5
(41)

One way to secure against Trojan horse attacks is the use of a secure,trusted operating system.

(True/False)
4.8/5
(28)

Functionality is the security features provided by a product.

(True/False)
4.7/5
(31)

A subject can exercise only accesses for which it has the necessary authorization and which satisfy the MAC rules.

(True/False)
4.8/5
(37)

The _______ access mode allows the subject both read and write access to the object.

(Multiple Choice)
4.7/5
(28)

An object is said to have a security ________ of a given level.

(Short Answer)
5.0/5
(32)

The Common Criteria for Information Technology and Security Evaluation are ISO standards for specifying security requirements and defining evaluation criteria.

(True/False)
4.9/5
(31)

The BLP model effectively breaks down when (untrusted)low classified executable data are allowed to be executed by a high clearance (trusted) subject.

(True/False)
5.0/5
(34)

_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.

(Short Answer)
5.0/5
(28)

To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.

(Short Answer)
4.8/5
(27)

Multilevel security is of interest when there is a requirement to maintain a resource in which multiple levels of data sensitivity are defined.

(True/False)
4.7/5
(31)

The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.

(Short Answer)
4.8/5
(19)

The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.

(Short Answer)
5.0/5
(41)

"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.

(Multiple Choice)
4.8/5
(28)

The _________ Model was developed for commercial applications in which conflicts of interest can arise.

(Multiple Choice)
4.8/5
(35)

The ________ is the government agency that monitors the evaluation process.

(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)