Exam 13: Trusted Computing and Multilevel Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
Free
(Essay)
4.8/5
(31)
Correct Answer:
Certification
"No write down" is also referred to as the *-property.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
Free
(Essay)
4.8/5
(29)
Correct Answer:
multilevel
The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.
(Essay)
4.9/5
(31)
A subject can exercise only accesses for which it has the necessary
authorization and which satisfy the MAC rules.
(True/False)
4.9/5
(35)
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.
(Essay)
5.0/5
(33)
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .
(Multiple Choice)
4.8/5
(33)
An object is said to have a security clearance of a given level.
(True/False)
4.9/5
(35)
The ________ access mode allows the subject only write access to the object.
(Multiple Choice)
4.9/5
(23)
"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.
(Multiple Choice)
4.8/5
(39)
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.
(Multiple Choice)
4.8/5
(40)
An entire database such as a financial or personnel database cannot be
maintained on a server with other files and still be classified as confidential or restricted.
(True/False)
4.8/5
(39)
To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.
(Essay)
4.9/5
(39)
A _______ is a collection of requirements that share a common focus or intent.
(Multiple Choice)
4.9/5
(30)
One of the most influential computer security models is the Bell-LaPadula
model.
(True/False)
4.8/5
(34)
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
(Essay)
4.9/5
(40)
Trusted computing provides three basic services: authenticated boot,certification, and _________.
(Essay)
4.8/5
(38)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)