merkow_tb_05

merkow_tb_05 - CHAPTER 5: SECURITY ARCHITECHURE AND MODELS...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 5: SECURITY ARCHITECHURE AND MODELS Multiple Choice: 1. Which of the following consists of components that enforce a unified security policy over a system? A. MAC B. GNU C. TCB D. TCSEC Answer: C Reference: Defining the Trusted Computing Base Difficulty: moderate 2. An abstract machine: A. Mediates access from a subject B. Mediates access to an object C. Cannot be bypassed D. All of the above Answer: D Reference: Defining the Trusted Computing Base Difficulty: moderate 3. A reference monitor should be all of the following except: A. Complete in that it mediates all access B. Changeable by other system entities C. Verifiable and cannot be circumvented D. Isolated from modification Answer: B Reference: Defining the Trusted Computing Base Difficulty: moderate 4. Which of the following is NOT essential for military-grade IT security to prevent unauthorized access? A. OSRAM B. TCB C. Reference monitor D. Security kernel Answer: A Reference: Defining the Trusted Computing Base Difficulty: moderate
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
5. After undergoing formal testing and validation a trusted system can meet user’s requirements for all of the following except: A. Reliability B. Security C. Speed D. Effectiveness Answer: C Reference: Defining the Trusted Computing Base Difficulty: moderate 6. What is within a trusted system that people want to access or use? A. Object B. Subject C. MAC D. TCB Answer: A Reference: Defining the Trusted Computing Base Difficulty: moderate 7. Which of the following questions is NOT used to determine the hierarchy of the rings of trust? A. Is the host in a physically secured room? B. Does the host have normal user accounts? C. Does the host use software with data from the Internet? D. Will users rely on flash drives? Answer: D Reference: Rings of Trust Difficulty: moderate 8. All of the following general rules are used to construct rings of trust in networked systems except: A. Hosts trust more inner ring hosts than themselves B. Hosts do not trust outer ring hosts more than themselves C. Hosts in a ring of a segmented sub network trust hosts in the same ring of a different segment D. Hosts trust hosts in the same ring Answer: C Reference: Rings of Trust Difficulty: moderate 9. Which design objective prevents data leakage and modification of the data while it is in memory? A. Process isolation
Background image of page 2
B. Data hiding C. Layering D. Abstraction Answer: A Reference: Protection Mechanisms in a Trusted Computing Base Difficulty: moderate 10. Which process ignores implementation details to concentrate on what is important to maintain security? A.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/05/2011 for the course IT 6392 taught by Professor Smith during the Spring '10 term at GCSU.

Page1 / 9

merkow_tb_05 - CHAPTER 5: SECURITY ARCHITECHURE AND MODELS...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online