Exam 13: Trusted Computing and Multilevel Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A multilevel secure system for confidentiality must enforce:
(Multiple Choice)
4.9/5
(32)
An entire database such as a financial or personnel database cannot be
maintained on a server with other files and still be classified as confidential or restricted.
(True/False)
4.9/5
(36)
The ________ control the manner by which a subject may access an object.
(Multiple Choice)
4.8/5
(36)
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
(Short Answer)
4.7/5
(41)
One way to secure against Trojan horse attacks is the use of a secure,trusted
operating system.
(True/False)
4.8/5
(28)
A subject can exercise only accesses for which it has the necessary
authorization and which satisfy the MAC rules.
(True/False)
4.8/5
(37)
The _______ access mode allows the subject both read and write access to the object.
(Multiple Choice)
4.7/5
(28)
An object is said to have a security ________ of a given level.
(Short Answer)
5.0/5
(32)
The Common Criteria for Information Technology and Security Evaluation
are ISO standards for specifying security requirements and defining evaluation criteria.
(True/False)
4.9/5
(31)
The BLP model effectively breaks down when (untrusted)low classified
executable data are allowed to be executed by a high clearance (trusted) subject.
(True/False)
5.0/5
(34)
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
(Short Answer)
5.0/5
(28)
To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.
(Short Answer)
4.8/5
(27)
Multilevel security is of interest when there is a requirement to maintain a
resource in which multiple levels of data sensitivity are defined.
(True/False)
4.7/5
(31)
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
(Short Answer)
4.8/5
(19)
The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.
(Short Answer)
5.0/5
(41)
"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.
(Multiple Choice)
4.8/5
(28)
The _________ Model was developed for commercial applications in which conflicts of interest can arise.
(Multiple Choice)
4.8/5
(35)
The ________ is the government agency that monitors the evaluation process.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)