Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.

(Short Answer)
4.8/5
(32)

__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.

(Multiple Choice)
4.8/5
(29)

The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

(Multiple Choice)
4.9/5
(41)

Trusted computing provides three basic services: authenticated boot,certification, and _________.

(Short Answer)
4.8/5
(34)

________ is a process that ensures a system is developed and operated as intended by the system's security policy.

(Multiple Choice)
4.9/5
(27)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)