Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ rules are security policy restrictions on the behavior of IVPs and TPs.

Free
(Essay)
4.8/5
(31)
Correct Answer:
Verified

Certification

"No write down" is also referred to as the *-property.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

When multiple categories or levels of data are defined,the requirement is referred to as __________ security.

Free
(Essay)
4.8/5
(29)
Correct Answer:
Verified

multilevel

The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.

(Essay)
4.9/5
(31)

Security classes are referred to as __________.

(Multiple Choice)
4.8/5
(29)

A subject can exercise only accesses for which it has the necessary authorization and which satisfy the MAC rules.

(True/False)
4.9/5
(35)

"No read up" is also referred to as the _________ property.

(Essay)
4.7/5
(32)

The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.

(Essay)
5.0/5
(33)

Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .

(Multiple Choice)
4.8/5
(33)

An object is said to have a security clearance of a given level.

(True/False)
4.9/5
(35)

The ________ access mode allows the subject only write access to the object.

(Multiple Choice)
4.9/5
(23)

"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.

(Multiple Choice)
4.8/5
(39)

________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.

(Multiple Choice)
4.8/5
(40)

An entire database such as a financial or personnel database cannot be maintained on a server with other files and still be classified as confidential or restricted.

(True/False)
4.8/5
(39)

To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.

(Essay)
4.9/5
(39)

A component describes a specific set of security requirements.

(True/False)
4.8/5
(30)

A _______ is a collection of requirements that share a common focus or intent.

(Multiple Choice)
4.9/5
(30)

One of the most influential computer security models is the Bell-LaPadula model.

(True/False)
4.8/5
(34)

The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.

(Essay)
4.9/5
(40)

Trusted computing provides three basic services: authenticated boot,certification, and _________.

(Essay)
4.8/5
(38)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)