Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Quiz 13: Trusted Computing and Multilevel Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
A subject is said to have a security _________ of a given level.
Question 22
Short Answer
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
Question 23
Multiple Choice
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .
Question 24
Short Answer
"No read up" is also referred to as the _________ property.
Question 25
Multiple Choice
________ is a process that ensures a system is developed and operated as intended by the system's security policy.
Question 26
Short Answer
The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.
Question 27
Multiple Choice
The ________ is the government agency that monitors the evaluation process.
Question 28
Multiple Choice
A _______ is a collection of requirements that share a common focus or intent.
Question 29
Multiple Choice
_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.
Question 30
Short Answer
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
Question 31
Short Answer
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
Question 32
Multiple Choice
"An individual (or role) may grant to another individual (or role) access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.
Question 33
Multiple Choice
The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.
Question 34
Short Answer
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
Question 35
Multiple Choice
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.
Question 36
Multiple Choice
The _________ Model was developed for commercial applications in which conflicts of interest can arise.
Question 37
Multiple Choice
__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.
Question 38
Short Answer
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.