Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

15 Cards in this Set

  • Front
  • Back
What can best be defined as the sum of protection mechanisms inside the comuputer, including hardware, firmware, and software?
trusted computing base
Which of the following statements pertaining to protection rings is false?
They support the CIA triad requirements of multitasking operating systems
Which of the following places the Orange Book classifications in order from most secure to least secure?
Division A, B, C, D
The Orange Book describes four hierarchical levels to categorize security systems. Which of the following levels requier mandatory protection?
Division A and B
Which Orange Book security rating represents the highest security level?
Which Orange Book security rating introduces security labels?
The Orange Book is founded upon which security policy model?
the Bell-LaPadula model
The Information Technology Security Evaluation Criteria (ITSEC)was written to address which of the following that the Orange Book did not address?
integrity and availability
What does CC stand for?
Common Criteria for Information Security Evaluation
What is it called when a computer uses more than one CPU in parallel to execute instructions?
Which of the following choices describe a condition when RAM and secondary storage are used together?
vertual storage
What is the Biba security model concerned with?
Which of the following is not a method to protect subjects, objects,and the data within the objects?
data mining
What is the main concern of the Bell-LaPadula security model?
What would best define a covert channel?
a communication channel that allows transfer of information in a manner that violates the system's security policy