Which of the following ensures that security is not breached when a system crash or other system failure occur
Which of the following ensures that security is not breached when a system crash or other system
failure occurs?
What type of subsystem is an application program that operates outside the operating system and carries out fu
What type of subsystem is an application program that operates outside the operating system and
carries out functions for a group of users, maintains some common data for all users in the group,
and protects the data from improper access by users in the group?
which of the following?
A ‘Pseudo flaw’ is which of the following?
Which of the following yellow-book defined types of system recovery happens after a system fails in an uncront
Which of the following yellow-book defined types of system recovery happens after a system fails
in an uncrontrolled manner in response to a TCB or media failure and the system cannot be
brought to a consistent state?
Which one of the following describes a reference monitor?
Which one of the following describes a reference monitor?
What can best be described as an abstract machine which must mediate all access to subjects to objects?
What can best be described as an abstract machine which must mediate all access to subjects to
objects?
What is the PRIMARY component of a Trusted Computer Base?
What is the PRIMARY component of a Trusted Computer Base?
Which of the following is best defined as a mode of system termination that automatically leaves system proce
Which of the following is best defined as a mode of system termination that automatically leaves
system processes and components in a secure state when a failure occurs or is detected in the
system?
what Access Control method to protect the integrity of processes and data?
LOMAC uses what Access Control method to protect the integrity of processes and data?
On Linux, LOMAC is implemented as:
On Linux, LOMAC is implemented as: