Deck 13: Trusted Computing and Multilevel Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 13: Trusted Computing and Multilevel Security
1
The BLP model effectively breaks down when (untrusted)low classified
executable data are allowed to be executed by a high clearance (trusted) subject.
executable data are allowed to be executed by a high clearance (trusted) subject.
True
2
The Biba models deals with confidentiality and is concerned with
unauthorized disclosure of information.
unauthorized disclosure of information.
False
3
Multilevel security is of interest when there is a requirement to maintain a
resource in which multiple levels of data sensitivity are defined.
resource in which multiple levels of data sensitivity are defined.
True
4
Security classes are referred to as __________.
A)security clearances
A)security levels
B)security classifications
D)security properties
A)security clearances
A)security levels
B)security classifications
D)security properties
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A subject can exercise only accesses for which it has the necessary
authorization and which satisfy the MAC rules.
authorization and which satisfy the MAC rules.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The Common Criteria for Information Technology and Security Evaluation
are ISO standards for specifying security requirements and defining evaluation criteria.
are ISO standards for specifying security requirements and defining evaluation criteria.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
One of the most influential computer security models is the Bell-LaPadula
model.
model.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The ________ access mode allows the subject only write access to the object.
A)read
B)append
C)write
D)execute
A)read
B)append
C)write
D)execute
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A multilevel secure system for confidentiality must enforce:
A)no read up
B)ss-property
C)no write down
D)all of the above
A)no read up
B)ss-property
C)no write down
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
An entire database such as a financial or personnel database cannot be
maintained on a server with other files and still be classified as confidential or restricted.
maintained on a server with other files and still be classified as confidential or restricted.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The ________ control the manner by which a subject may access an object.
A)security classes
B)security classifications
C)security clearances
D)security properties
A)security classes
B)security classifications
C)security clearances
D)security properties
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
"No write down" is also referred to as the *-property.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The BLP model includes a set of rules based on abstract operations that
change the state of the system.
change the state of the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The _______ access mode allows the subject both read and write access to the object.
A)read
B)append
C)write
D)execute
A)read
B)append
C)write
D)execute
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A component describes a specific set of security requirements.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
An object is said to have a security clearance of a given level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Functionality is the security features provided by a product.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
One way to secure against Trojan horse attacks is the use of a secure,trusted
operating system.
operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The addition of multilevel security to a database system does not increase
the complexity of the access control function.
the complexity of the access control function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Problems with providing strong computer security involve only the design
phase.
phase.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A subject is said to have a security _________ of a given level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .
A)polyinstantiation
B)ds-property
C)trust
D)MAC
A)polyinstantiation
B)ds-property
C)trust
D)MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
"No read up" is also referred to as the _________ property.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
________ is a process that ensures a system is developed and operated as intended by the system's security policy.
A)Trust
B)Assurance
C)Evaluation
D)Functionality
A)Trust
B)Assurance
C)Evaluation
D)Functionality
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The ________ is the government agency that monitors the evaluation process.
A)sponsor
B)certifier
C)evaluator
D)developer
A)sponsor
B)certifier
C)evaluator
D)developer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A _______ is a collection of requirements that share a common focus or intent.
A)trust
B)family
C)class
D)component
A)trust
B)family
C)class
D)component
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.
A)TCB
B)Trustworthiness
C)Trusted computing
D)TPM
A)TCB
B)Trustworthiness
C)Trusted computing
D)TPM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.
A)ss-property
B)ds-property
C)*-property
D)cc-property
A)ss-property
B)ds-property
C)*-property
D)cc-property
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.
A)BLP
B)TC
C)CC
D)TPM
A)BLP
B)TC
C)CC
D)TPM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.
A)Classification creep
B)Trusted platform
C)Common criteria
D)Polyinstantiation
A)Classification creep
B)Trusted platform
C)Common criteria
D)Polyinstantiation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The _________ Model was developed for commercial applications in which conflicts of interest can arise.
A)Biba
B)Clark-Wilson Integrity
C)Bell-Lapadula
D)Chinese Wall
A)Biba
B)Clark-Wilson Integrity
C)Bell-Lapadula
D)Chinese Wall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.
A)Reference
B)Trust
C)Sanitized
D)MAC
A)Reference
B)Trust
C)Sanitized
D)MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
An object is said to have a security ________ of a given level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Trusted computing provides three basic services: authenticated boot,certification, and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck