PrepAway - Latest Free Exam Questions & Answers

The hardware, firmware, and software elements of a trusted computing base that implement the reference monitor

A reference monitor is a system component that enforces access controls on an object. Specifically,
the reference monitor concept is an abstract machine that mediates all access of subjects to objects.
The hardware, firmware, and software elements of a trusted computing base that implement the
reference monitor concept are called:

PrepAway - Latest Free Exam Questions & Answers

A.
Identification and authentication (I & A) mechanisms

B.
The auditing subsystem

C.
The security kernel

D.
The authorization database

Explanation:

The security kernel implements the reference model concept. The reference model must have the
following characteristics: It must mediate all accesses. It must be protected from modification. It
must be verifiable as correct. Answer “the authorization database” is used by the reference monitor
to mediate accesses by subjects to objects. When a request for access is received, the reference
monitor refers to entries in the authorization database to verify that the operation requested by a
subject for application to an object is permitted. The authorization database has entries or
authorizations of the form subject, object, access mode. In answer “Identification and authentication
(I & A) mechanisms”, the I & A operation is separate from the reference monitor. The user enters
his/her identification to the I & A function. Then the user must be authenticated. Authentication is
verification that the user’s claimed identity is valid. Authentication is based on the following three
factor types: Type 1. Something you know, such as a PIN or password Type 2. Something you have,
such as an ATM card or smart card Type 3. Something you are (physically), such as a fingerprint or
retina scan Answer “The auditing subsystem” is a key complement to the reference monitor. The
auditing subsystem is used by the reference monitor to keep track of the reference monitor’s
activities. Examples of such activities include the date and time of an access request, identification of
the subject and objects involved, the access privileges requested and the result of the request.


Leave a Reply