• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
A server farm is an example of:


A. Server clustering

B. Redundant servers

C. Multiple servers

D. Server fault tolerance
Server clustering
In which state must a computer system operate to process input/output instructions?


A. User mode

B. Stateful inspection

C. Interprocess communication

D. Supervisor mode
Supervisor mode
What should be the size of a Trusted Computer Base?


A. Small - in order to permit it to be implemented in all critical system components without using excessive resources.

B. Small - in order to facilitate the detailed analysis necessary to prove that it meets design requirements.

C. Large - in order to accommodate the implementation of future updates without incurring the time and expense of recertification.

D. Large - in order to enable it to protect the potentially large number of resources in a typical commercial system environment.
Small - in order to facilitate the detailed analysis necessary to prove that it meets design requirements.
Which one of the following are examples of security and controls that would be found in a "trusted" application system?


A. Data validation and reliability

B. Correction routines and reliability

C. File integrity routines and audit trail

D. Reconciliation routines and data labels
File integrity routines and audit trail
Which of the following is an operating system security architecture that provides flexible support for security policies?


A. OSKit

B. LOMAC

C. SE Linux

D. Flask
Flask
Which of the following statements pertaining to the security kernel is incorrect?


A. It is made up of mechanisms that fall under the TCB and implements and enforces the reference monitor concept.

B. It must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof

C. It must be small enough to be able to be tested and verified in a complete and comprehensive manner

D. Is an access control concept, not an actual physical component
Is an access control concept, not an actual physical component
What is a PRIMARY reason for designing the security kernel to be as small as possible?


A. The operating system cannot be easily penetrated by users.

B. Changes to the kernel are not required as frequently.

C. Due to its compactness, the kernel is easier to formally verify.

D. System performance and execution are enhanced.
Due to its compactness, the kernel is easier to formally verify.
Which of the following implements the authorized access relationship between subjects and objects of a system?


A. Security model

B. Reference kernel

C. Security kernel

D. Information flow model
Security kernel
The concept that all accesses must be meditated, protected from modification, and verifiable as correct is the concept of


A. Secure model

B. Security locking

C. Security kernel

D. Secure state
Security kernel
What is an error called that causes a system to be vulnerable because of the environment in which it is installed?


A. Configuration error

B. Environmental error

C. Access validation error

D. Exceptional condition handling error
Environmental error