• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
What can best be defined as the sum of protection mechanisms inside the comuputer, including hardware, firmware, and software?
trusted computing base
Which of the following statements pertaining to protection rings is false?
They support the CIA triad requirements of multitasking operating systems
Which of the following places the Orange Book classifications in order from most secure to least secure?
Division A, B, C, D
The Orange Book describes four hierarchical levels to categorize security systems. Which of the following levels requier mandatory protection?
Division A and B
Which Orange Book security rating represents the highest security level?
B2
Which Orange Book security rating introduces security labels?
B1
The Orange Book is founded upon which security policy model?
the Bell-LaPadula model
The Information Technology Security Evaluation Criteria (ITSEC)was written to address which of the following that the Orange Book did not address?
integrity and availability
What does CC stand for?
Common Criteria for Information Security Evaluation
What is it called when a computer uses more than one CPU in parallel to execute instructions?
multiprocessing
Which of the following choices describe a condition when RAM and secondary storage are used together?
vertual storage
What is the Biba security model concerned with?
integrity
Which of the following is not a method to protect subjects, objects,and the data within the objects?
data mining
What is the main concern of the Bell-LaPadula security model?
confidentiality
What would best define a covert channel?
a communication channel that allows transfer of information in a manner that violates the system's security policy