Deck 13: Trusted Computing and Multilevel Security

ملء الشاشة (f)
exit full mode
سؤال
The BLP model effectively breaks down when (untrusted)low classified
executable data are allowed to be executed by a high clearance (trusted) subject.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Biba models deals with confidentiality and is concerned with
unauthorized disclosure of information.
سؤال
Multilevel security is of interest when there is a requirement to maintain a
resource in which multiple levels of data sensitivity are defined.
سؤال
Security classes are referred to as __________.
A)security clearances

A)security levels
B)security classifications
D)security properties
سؤال
A subject can exercise only accesses for which it has the necessary
authorization and which satisfy the MAC rules.
سؤال
The Common Criteria for Information Technology and Security Evaluation
are ISO standards for specifying security requirements and defining evaluation criteria.
سؤال
One of the most influential computer security models is the Bell-LaPadula
model.
سؤال
The ________ access mode allows the subject only write access to the object.

A)read
B)append
C)write
D)execute
سؤال
A multilevel secure system for confidentiality must enforce:

A)no read up
B)ss-property
C)no write down
D)all of the above
سؤال
An entire database such as a financial or personnel database cannot be
maintained on a server with other files and still be classified as confidential or restricted.
سؤال
The ________ control the manner by which a subject may access an object.

A)security classes
B)security classifications
C)security clearances
D)security properties
سؤال
"No write down" is also referred to as the *-property.
سؤال
The BLP model includes a set of rules based on abstract operations that
change the state of the system.
سؤال
The _______ access mode allows the subject both read and write access to the object.

A)read
B)append
C)write
D)execute
سؤال
A component describes a specific set of security requirements.
سؤال
An object is said to have a security clearance of a given level.
سؤال
Functionality is the security features provided by a product.
سؤال
One way to secure against Trojan horse attacks is the use of a secure,trusted
operating system.
سؤال
The addition of multilevel security to a database system does not increase
the complexity of the access control function.
سؤال
Problems with providing strong computer security involve only the design
phase.
سؤال
A subject is said to have a security _________ of a given level.
سؤال
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
سؤال
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .

A)polyinstantiation
B)ds-property
C)trust
D)MAC
سؤال
"No read up" is also referred to as the _________ property.
سؤال
________ is a process that ensures a system is developed and operated as intended by the system's security policy.

A)Trust
B)Assurance
C)Evaluation
D)Functionality
سؤال
The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.
سؤال
The ________ is the government agency that monitors the evaluation process.

A)sponsor
B)certifier
C)evaluator
D)developer
سؤال
A _______ is a collection of requirements that share a common focus or intent.

A)trust
B)family
C)class
D)component
سؤال
_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.

A)TCB
B)Trustworthiness
C)Trusted computing
D)TPM
سؤال
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
سؤال
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
سؤال
"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.

A)ss-property
B)ds-property
C)*-property
D)cc-property
سؤال
The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

A)BLP
B)TC
C)CC
D)TPM
سؤال
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
سؤال
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.

A)Classification creep
B)Trusted platform
C)Common criteria
D)Polyinstantiation
سؤال
The _________ Model was developed for commercial applications in which conflicts of interest can arise.

A)Biba
B)Clark-Wilson Integrity
C)Bell-Lapadula
D)Chinese Wall
سؤال
__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.

A)Reference
B)Trust
C)Sanitized
D)MAC
سؤال
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.
سؤال
The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.
سؤال
An object is said to have a security ________ of a given level.
سؤال
In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.
سؤال
_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.
سؤال
Trusted computing provides three basic services: authenticated boot,certification, and _________.
سؤال
The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.
سؤال
To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Trusted Computing and Multilevel Security
1
The BLP model effectively breaks down when (untrusted)low classified
executable data are allowed to be executed by a high clearance (trusted) subject.
True
2
The Biba models deals with confidentiality and is concerned with
unauthorized disclosure of information.
False
3
Multilevel security is of interest when there is a requirement to maintain a
resource in which multiple levels of data sensitivity are defined.
True
4
Security classes are referred to as __________.
A)security clearances

A)security levels
B)security classifications
D)security properties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
A subject can exercise only accesses for which it has the necessary
authorization and which satisfy the MAC rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
The Common Criteria for Information Technology and Security Evaluation
are ISO standards for specifying security requirements and defining evaluation criteria.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
One of the most influential computer security models is the Bell-LaPadula
model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
The ________ access mode allows the subject only write access to the object.

A)read
B)append
C)write
D)execute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
A multilevel secure system for confidentiality must enforce:

A)no read up
B)ss-property
C)no write down
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
An entire database such as a financial or personnel database cannot be
maintained on a server with other files and still be classified as confidential or restricted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ________ control the manner by which a subject may access an object.

A)security classes
B)security classifications
C)security clearances
D)security properties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
"No write down" is also referred to as the *-property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The BLP model includes a set of rules based on abstract operations that
change the state of the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The _______ access mode allows the subject both read and write access to the object.

A)read
B)append
C)write
D)execute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
A component describes a specific set of security requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
An object is said to have a security clearance of a given level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Functionality is the security features provided by a product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
One way to secure against Trojan horse attacks is the use of a secure,trusted
operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
The addition of multilevel security to a database system does not increase
the complexity of the access control function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Problems with providing strong computer security involve only the design
phase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
A subject is said to have a security _________ of a given level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
_________ rules are built-in system security mechanisms that achieve the objectives of the certification rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________ .

A)polyinstantiation
B)ds-property
C)trust
D)MAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
"No read up" is also referred to as the _________ property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ is a process that ensures a system is developed and operated as intended by the system's security policy.

A)Trust
B)Assurance
C)Evaluation
D)Functionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ________ access mode allows the subject neither read nor write access to the object but may invoke the object for execution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
The ________ is the government agency that monitors the evaluation process.

A)sponsor
B)certifier
C)evaluator
D)developer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _______ is a collection of requirements that share a common focus or intent.

A)trust
B)family
C)class
D)component
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
_________ is assurance that a system deserves to be trusted such that the trust can be guaranteed in some convincing way such as through formal analysis or code review.

A)TCB
B)Trustworthiness
C)Trusted computing
D)TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
When multiple categories or levels of data are defined,the requirement is referred to as __________ security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
_________ rules are security policy restrictions on the behavior of IVPs and TPs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
"An individual (or role)may grant to another individual (or role)access to a document based on the owner's discretion,constrained by the MAC rules" describes the _________.

A)ss-property
B)ds-property
C)*-property
D)cc-property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The _______ is a hardware module that is at the heart of a hardware/software approach to trusted computing.

A)BLP
B)TC
C)CC
D)TPM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
The _________ model is aimed at commercial rather than military applications and closely models real commercial operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ is when a new document consolidates information from a range of sources and levels so that some of that information is now classified at a higher level than it was originally.

A)Classification creep
B)Trusted platform
C)Common criteria
D)Polyinstantiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
The _________ Model was developed for commercial applications in which conflicts of interest can arise.

A)Biba
B)Clark-Wilson Integrity
C)Bell-Lapadula
D)Chinese Wall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
__________ data are data that may be derived from corporate data but that cannot be used to discover the corporation's identity.

A)Reference
B)Trust
C)Sanitized
D)MAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The _________ model is intended to deal with the case in which there is data that must be visible to users at multiple or all security levels but should only be modified in controlled ways by authorized agents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
The __________ is a controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
An object is said to have a security ________ of a given level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
In the United States the ______ and the NSA jointly operate the Common Criteria Evaluation and Validation Scheme.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
_________ secure is a class of system that has system resources at more than one security level and that permits concurrent access by users who differ in security clearance and need-to-know,but is able to prevent each user from accessing resources for which the user lacks authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
Trusted computing provides three basic services: authenticated boot,certification, and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
The __________ service is responsible for booting the entire operating system in stages and assuring that each portion of the OS,as it is loaded,is a version that is approved for use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
To structure the need for assurance the CC defines a scale for rating assurance consisting of _____ evaluation assurance levels ranging from the least rigor and scope for assurance evidence to the most.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.