Exam 13: Trusted Computing and Multilevel Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.
(Multiple Choice)
4.8/5
(36)
_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.
(Essay)
4.9/5
(36)
Problems with providing strong computer security involve only the design
phase.
(True/False)
4.9/5
(38)
The BLP model includes a set of rules based on abstract operations that
change the state of the system.
(True/False)
4.8/5
(31)
The ________ is the government agency that monitors the evaluation process.
(Multiple Choice)
4.8/5
(29)
In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.
(Essay)
4.8/5
(28)
The BLP model effectively breaks down when (untrusted)low classified
executable data are allowed to be executed by a high clearance (trusted) subject.
(True/False)
4.9/5
(34)
The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.
(Essay)
4.8/5
(30)
The addition of multilevel security to a database system does not increase
the complexity of the access control function.
(True/False)
4.8/5
(40)
The Common Criteria for Information Technology and Security Evaluation
are ISO standards for specifying security requirements and defining evaluation criteria.
(True/False)
4.8/5
(30)
The Biba models deals with confidentiality and is concerned with
unauthorized disclosure of information.
(True/False)
4.8/5
(35)
A multilevel secure system for confidentiality must enforce:
(Multiple Choice)
4.8/5
(32)
One way to secure against Trojan horse attacks is the use of a secure,trusted
operating system.
(True/False)
4.7/5
(31)
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
(Essay)
4.9/5
(30)
__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.
(Multiple Choice)
4.9/5
(43)
The _______ access mode allows the subject both read and write access to the object.
(Multiple Choice)
4.7/5
(30)
Multilevel security is of interest when there is a requirement to maintain a
resource in which multiple levels of data sensitivity are defined.
(True/False)
5.0/5
(33)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)