Deck 13: Security Standards

Full screen (f)
exit full mode
Question
The DoD security categories range from minimal protection to ____________ protection.
Use Space or
up arrow
down arrow
to flip the card.
Question
One security division contains ____________ categories so named because such operating systems have yet to be developed.
Question
Operating systems such as HP-UX BLS,Cray Research Trusted Unicos 8.0,and Digital SEVMS all are within which security division?

A)A - Verified Protection
B)B - Mandatory Protection
C)C - Discretionary Protection
D)D - Minimal Protection
Question
What is the purpose of the concept of "separation of duties" as used in some security models?

A)To allow multiple users to access the same file at the same to perform different file updates.
B)To allow system administrators to have powers that regular users do not.
C)To permit different user groups to have different levels of file access.
D)To prevent authorized users from making improper modifications to data.
Question
What division designation is given to a system with a classification so low it is not rated?

A)A - Unrated
B)N - Not Rated
C)D - Minimal Protection
D)D - Unrated
Question
Which is a security model using the concepts of subjects,objects,and programs?

A)Bell-LaPadula Model
B)Biba Integrity Model
C)Clark-Wilson Model
D)State Machine Model
Question
To what does the term trusted computing base refer?

A)A base station facility for secure wireless computing
B)A completely unified structure of protection mechanisms within a computer system
C)A server that maintains secure access
D)A system of numerous domains participating in two-way trust arrangements
Question
Which was NOT part of the origins of the Common Criteria?

A)CTCPEC (Canadian Trusted Computer Product Evaluation Criteria
B)ITSEC (Information Technology Security Evaluation Criteria
C)SANS International Guidelines for Computer Security
D)The Orange Book
Question
To what does the "Discretionary Protection" category refer?

A)Auditing systems
B)Windows 2000 and Windows XP systems
C)TCBs with secure login systems
D)TCBs with some file and device protection
Question
Which is a security model originally designed in anticipation of United States military applications?

A)Bell-LaPadula Model
B)Biba Integrity Model
C)Chinese Wall Model
D)State Machine Model
Question
The ____________ is a collection of color-coded books on information security.
Question
Which variation of the Unix operating system provides the higher security level?

A)HP-UX-BLS
B)Linux Fedora
C)Multics
D)Trusted Xenix
Question
What level of protection is available in IBM OS\400,Windows XP,and Novell Netware?

A)B1 - Labeled Security Protection
B)C1 - Discretionary Security Protection
C)C2 - Controlled Access Protection
D)D - Minimal Protection
Question
What is the purpose of the Orange Book statement "All authorizations to the information contained within a storage object shall be revoked prior to initial assignment,allocation,or reallocation…" as used within level C?

A)It permits remote access limits to be implemented as needed.
B)It permits security access to be revoked or stopped whenever the system identifies inappropriate attempts to access materials for which they lack access rights.
C)It permits a user with lower security access to log on after someone else and access materials for which they lack access rights.
D)It prevents a user with lower security access from logging on after someone else and accessing materials for which they lack access rights.
Question
Who publishes a series of color-coded books on information security?

A)Department of Defense
B)Microsoft
C)SANS Institute
D)Trusted Computer Systems
Question
What is the common name given to one of a series of color-coded books that outlines criteria for rating various operating systems?

A)Black Book
B)Blue Book
C)Orange Book
D)Red Book
Question
The ____________ is the result of combining three existing standards.
Question
Of the following,which has the highest security level?

A)Digital SEVMS
B)Federal XTS-300
C)Honeywell Multics
D)Honeywell SCOMP
Question
Although the ____________ Model is similar to the Bell-LaPadula Model,it also has additional applications.
Question
The ____________ is a perhaps the best known of a series of color-coded books on information security.
Question
The purpose of the ____________ Model is to prevent information flow that can cause conflict of interest.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Security Standards
1
The DoD security categories range from minimal protection to ____________ protection.
verified
2
One security division contains ____________ categories so named because such operating systems have yet to be developed.
theoretical
3
Operating systems such as HP-UX BLS,Cray Research Trusted Unicos 8.0,and Digital SEVMS all are within which security division?

A)A - Verified Protection
B)B - Mandatory Protection
C)C - Discretionary Protection
D)D - Minimal Protection
B
4
What is the purpose of the concept of "separation of duties" as used in some security models?

A)To allow multiple users to access the same file at the same to perform different file updates.
B)To allow system administrators to have powers that regular users do not.
C)To permit different user groups to have different levels of file access.
D)To prevent authorized users from making improper modifications to data.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
What division designation is given to a system with a classification so low it is not rated?

A)A - Unrated
B)N - Not Rated
C)D - Minimal Protection
D)D - Unrated
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
Which is a security model using the concepts of subjects,objects,and programs?

A)Bell-LaPadula Model
B)Biba Integrity Model
C)Clark-Wilson Model
D)State Machine Model
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
To what does the term trusted computing base refer?

A)A base station facility for secure wireless computing
B)A completely unified structure of protection mechanisms within a computer system
C)A server that maintains secure access
D)A system of numerous domains participating in two-way trust arrangements
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
Which was NOT part of the origins of the Common Criteria?

A)CTCPEC (Canadian Trusted Computer Product Evaluation Criteria
B)ITSEC (Information Technology Security Evaluation Criteria
C)SANS International Guidelines for Computer Security
D)The Orange Book
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
To what does the "Discretionary Protection" category refer?

A)Auditing systems
B)Windows 2000 and Windows XP systems
C)TCBs with secure login systems
D)TCBs with some file and device protection
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
Which is a security model originally designed in anticipation of United States military applications?

A)Bell-LaPadula Model
B)Biba Integrity Model
C)Chinese Wall Model
D)State Machine Model
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
The ____________ is a collection of color-coded books on information security.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
Which variation of the Unix operating system provides the higher security level?

A)HP-UX-BLS
B)Linux Fedora
C)Multics
D)Trusted Xenix
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
What level of protection is available in IBM OS\400,Windows XP,and Novell Netware?

A)B1 - Labeled Security Protection
B)C1 - Discretionary Security Protection
C)C2 - Controlled Access Protection
D)D - Minimal Protection
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
What is the purpose of the Orange Book statement "All authorizations to the information contained within a storage object shall be revoked prior to initial assignment,allocation,or reallocation…" as used within level C?

A)It permits remote access limits to be implemented as needed.
B)It permits security access to be revoked or stopped whenever the system identifies inappropriate attempts to access materials for which they lack access rights.
C)It permits a user with lower security access to log on after someone else and access materials for which they lack access rights.
D)It prevents a user with lower security access from logging on after someone else and accessing materials for which they lack access rights.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
Who publishes a series of color-coded books on information security?

A)Department of Defense
B)Microsoft
C)SANS Institute
D)Trusted Computer Systems
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
What is the common name given to one of a series of color-coded books that outlines criteria for rating various operating systems?

A)Black Book
B)Blue Book
C)Orange Book
D)Red Book
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
The ____________ is the result of combining three existing standards.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
Of the following,which has the highest security level?

A)Digital SEVMS
B)Federal XTS-300
C)Honeywell Multics
D)Honeywell SCOMP
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
Although the ____________ Model is similar to the Bell-LaPadula Model,it also has additional applications.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
The ____________ is a perhaps the best known of a series of color-coded books on information security.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of the ____________ Model is to prevent information flow that can cause conflict of interest.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.