What can best be described as an abstract machine which must mediate all access to subjects to objects?
What can best be described as an abstract machine which must mediate all access to subjects to
objects?
What is the PRIMARY component of a Trusted Computer Base?
What is the PRIMARY component of a Trusted Computer Base?
Which of the following is best defined as a mode of system termination that automatically leaves system proce
Which of the following is best defined as a mode of system termination that automatically leaves
system processes and components in a secure state when a failure occurs or is detected in the
system?
what Access Control method to protect the integrity of processes and data?
LOMAC uses what Access Control method to protect the integrity of processes and data?
On Linux, LOMAC is implemented as:
On Linux, LOMAC is implemented as:
what operating system?
LOMAC is a security enhancement for what operating system?
What was introduced for circumventing difficulties in classic approaches to computer security by limiting dama
What was introduced for circumventing difficulties in classic approaches to computer security by
limiting damages produced by malicious programs?
A feature deliberately implemented in an operating system as a trap for intruders is called a:
A feature deliberately implemented in an operating system as a trap for intruders is called a:
Fault tolerance countermeasures are designed to combat threats to
Fault tolerance countermeasures are designed to combat threats to
which of the following?
A ‘Psuedo flaw’ is which of the following?