This method of joining a subject to an object is referred to as:
A security measure has recently been put into place within the accounting department. All users within a specified clearance level have been permanently tied to a database with an equal classification level. This method of joining a subject to an object is referred to as:
Which of the following are proper characteristics of a software process that runs within an operating system?
Which of the following are proper characteristics of a software process that runs within an operating system?
i.Set of instructions
ii. Assigned resources
iii. Loaded in memory
iv. Application programming interfaces
What is the term that describes Leos activities?
Because of increased security concerns, Leos IT staff begins taking aggressive steps to increase protection in their organization. Some of these steps include:
sandbox access controls, stronger network interfaces, and increased layering within operating systems. What is the term that describes Leos activities?
Which of the following is a system that has withstood benchmark testing and validation to meet user and evalua
Which of the following is a system that has withstood benchmark testing and validation to meet user and evaluation requirements?
what function?
The TCB is a security principle that ensures security within systems in all kinds of situations. One situation is when a process in one domain must access another domain in order to retrieve sensitive information. The TCB ensures that this action is performed in a secure manner by initiating what function?
Which of the following models deals with how subjects can access objects based upon established rights and cap
Which of the following models deals with how subjects can access objects based upon established rights and capabilities?
Ensuring that a process does what it is intended to do every time is called the __________ concept.
Ensuring that a process does what it is intended to do every time is called the __________ concept.
What is this referred to as?
George has a security clearance level higher than Donald. He has access to many devices and data that Donald doesnt have access to. In addition, George is not permitted to write or change data that is at a lower security clearance (data that Donald has access to). What is this referred to as?
What security model is this system based on?
Karen is an enlisted officer in the military and works in a data processing center. All data that is stored on the network is given a classification level of confidential, secret, or top secret. What security model is this system based on?
What type of operating mode is this exclusive group working from?
A secret clearance operations group works on a private network in a remote location. The security policy for the network design and operations group reads as follows: Each user on this network must a) have an approved clearance level for all information on the network, b) have formal access approval for and have signed a NDA for all information on the network, and c) a need-to-know for all information on the network. What type of operating mode is this exclusive group working from?