Exam 13: Trusted Computing and Multilevel Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.

(Essay)
4.9/5
(38)

The _________ Model was developed for commercial applications in which conflicts of interest can arise.

(Multiple Choice)
4.7/5
(32)

________ is a process that ensures a system is developed and operated as intended by the system's security policy.

(Multiple Choice)
4.9/5
(28)

The ________ control the manner by which a subject may access an object.

(Multiple Choice)
4.8/5
(47)

_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.

(Multiple Choice)
4.9/5
(31)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)