Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

(Multiple Choice)
4.8/5
(36)

_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.

(Essay)
4.9/5
(36)

Problems with providing strong computer security involve only the design phase.

(True/False)
4.9/5
(38)

An object is said to have a security ________ of a given level.

(Essay)
4.9/5
(36)

The BLP model includes a set of rules based on abstract operations that change the state of the system.

(True/False)
4.8/5
(31)

The ________ is the government agency that monitors the evaluation process.

(Multiple Choice)
4.8/5
(29)

In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.

(Essay)
4.8/5
(28)

The BLP model effectively breaks down when (untrusted)low classified executable data are allowed to be executed by a high clearance (trusted) subject.

(True/False)
4.9/5
(34)

The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.

(Essay)
4.8/5
(30)

The addition of multilevel security to a database system does not increase the complexity of the access control function.

(True/False)
4.8/5
(40)

The Common Criteria for Information Technology and Security Evaluation are ISO standards for specifying security requirements and defining evaluation criteria.

(True/False)
4.8/5
(30)

A subject is said to have a security _________ of a given level.

(Essay)
4.8/5
(36)

Functionality is the security features provided by a product.

(True/False)
4.7/5
(33)

The Biba models deals with confidentiality and is concerned with unauthorized disclosure of information.

(True/False)
4.8/5
(35)

A multilevel secure system for confidentiality must enforce:

(Multiple Choice)
4.8/5
(32)

One way to secure against Trojan horse attacks is the use of a secure,trusted operating system.

(True/False)
4.7/5
(31)

_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.

(Essay)
4.9/5
(30)

__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.

(Multiple Choice)
4.9/5
(43)

The _______ access mode allows the subject both read and write access to the object.

(Multiple Choice)
4.7/5
(30)

Multilevel security is of interest when there is a requirement to maintain a resource in which multiple levels of data sensitivity are defined.

(True/False)
5.0/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)