Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
A server farm is an example of:
A. Server clustering B. Redundant servers C. Multiple servers D. Server fault tolerance |
Server clustering
|
|
In which state must a computer system operate to process input/output instructions?
A. User mode B. Stateful inspection C. Interprocess communication D. Supervisor mode |
Supervisor mode
|
|
What should be the size of a Trusted Computer Base?
A. Small - in order to permit it to be implemented in all critical system components without using excessive resources. B. Small - in order to facilitate the detailed analysis necessary to prove that it meets design requirements. C. Large - in order to accommodate the implementation of future updates without incurring the time and expense of recertification. D. Large - in order to enable it to protect the potentially large number of resources in a typical commercial system environment. |
Small - in order to facilitate the detailed analysis necessary to prove that it meets design requirements.
|
|
Which one of the following are examples of security and controls that would be found in a "trusted" application system?
A. Data validation and reliability B. Correction routines and reliability C. File integrity routines and audit trail D. Reconciliation routines and data labels |
File integrity routines and audit trail
|
|
Which of the following is an operating system security architecture that provides flexible support for security policies?
A. OSKit B. LOMAC C. SE Linux D. Flask |
Flask
|
|
Which of the following statements pertaining to the security kernel is incorrect?
A. It is made up of mechanisms that fall under the TCB and implements and enforces the reference monitor concept. B. It must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof C. It must be small enough to be able to be tested and verified in a complete and comprehensive manner D. Is an access control concept, not an actual physical component |
Is an access control concept, not an actual physical component
|
|
What is a PRIMARY reason for designing the security kernel to be as small as possible?
A. The operating system cannot be easily penetrated by users. B. Changes to the kernel are not required as frequently. C. Due to its compactness, the kernel is easier to formally verify. D. System performance and execution are enhanced. |
Due to its compactness, the kernel is easier to formally verify.
|
|
Which of the following implements the authorized access relationship between subjects and objects of a system?
A. Security model B. Reference kernel C. Security kernel D. Information flow model |
Security kernel
|
|
The concept that all accesses must be meditated, protected from modification, and verifiable as correct is the concept of
A. Secure model B. Security locking C. Security kernel D. Secure state |
Security kernel
|
|
What is an error called that causes a system to be vulnerable because of the environment in which it is installed?
A. Configuration error B. Environmental error C. Access validation error D. Exceptional condition handling error |
Environmental error
|