ISC Exam Questions

On Linux, LOMAC is implemented as:

On Linux, LOMAC is implemented as:

A.
Virtual addresses

B.
Registers

C.
Kernel built in functions

D.
Loadable kernel module

Explanation:
LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access
Control to protect the integrity of processes and data from viruses, Trojan horses,
malicious remote users and compromised root daemons. LOMAC is implemented as a loadable
kernel module – no kernel recompilations or changes to existing applications are
required. Although not all the planned features are currently implemented, it presently
provides sufficient protection to thwart script-kiddies, and is stable enough for
everyday use.
“Security Kernel – The hardware, firmware, and software elements of a trusted computing base
(TCB) that implements the reference monitor concept. It must mediate all accesses between
subjects and objects, be protected from modification, and be verifiable as correct.” – Shon Harris
All-in-one CISSP Certification Guide pg 355