Which of the following is best defined as an administra…
Which of the following is best defined as an administrative declaration by a designated authority that an
information system is approved to operate in a particular security configuration with a prescribed set of
safeguards?
What is defined as the hardware, firmware and software …
What is defined as the hardware, firmware and software elements of a trusted computing base that implement
the reference monitor concept?
What is used to protect programs from all unauthorized …
What is used to protect programs from all unauthorized modification or executional interference?
Who first described the DoD multilevel military securit…
Who first described the DoD multilevel military security policy in abstract, formal terms?
which a number of processor units are employed in a sin…
Which of the following describes a technique in which a number of processor units are employed in a single
computer system to increase the performance of the system in its application environment above the
performance of a single processor of the same kind?
A channel within a computer system or network that is d…
A channel within a computer system or network that is designed for the authorized transfer of information is
identified as a(n)?
What is called the formal acceptance of the adequacy of…
What is called the formal acceptance of the adequacy of a system’s overall security by the management?
Which of the following is not a method to protect objec…
Which of the following is not a method to protect objects and the data within the objects?
What can be defined as an abstract machine that mediate…
What can be defined as an abstract machine that mediates all access to objects by subjects to ensure that
subjects have the necessary access rights and to protect objects from unauthorized access?
Which of the following statements pertaining to the tru…
Which of the following statements pertaining to the trusted computing base (TCB) is false?
