PrepAway - Latest Free Exam Questions & Answers

In Operations Security trusted paths provide:

In Operations Security trusted paths provide:

PrepAway - Latest Free Exam Questions & Answers

A.
trustworthy integration into integrity functions.

B.
trusted access to unsecure paths.

C.
trustworthy interfaces into privileged user functions.

D.
trustworthy interfaces into privileged MTBF functions.

Explanation:
“Trusted paths provide trustworthy interfaces into privileged user functions and are intended to provide a way to
ensure that any communications over that path cannot be intercepted or corrupted.”
The trusted computing base (TCB) is a collection of all the hardware, software, and firmware components
within a system that provide some type of security and enforce the system’s security policy. The TCB does not
address only operating system components, because a computer system is not made up of only an operating
system. Hardware, software components, and firmware components can affect the system in a negative or
positive manner, and each has a responsibility to support and enforce the security policy of that particular
system.
A trusted path is a communication channel between the user, or program, and the TCB. The TCB provides
protection resources to ensure this channel cannot be compromised in any way.
Incorrect Answers:
A: Trusted paths do not provide trustworthy integration into integrity functions; this is not the correct definition of
a trusted path.
B: Trusted paths do not provide trusted access to unsecure paths; this is not the correct definition of a trusted
path. A trusted path provides a secure path so that a user can access the TCB without being compromised by
other processes or users.
D: MTBF stands for Mean Time Between Failures. This has nothing to do with trusted path.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, pp. 359-360


Leave a Reply