what operating system?
LOMAC is a security enhancement for what operating system?
What was introduced for circumventing difficulties in classic approaches to computer security by limiting dama
What was introduced for circumventing difficulties in classic approaches to computer security by
limiting damages produced by malicious programs?
A feature deliberately implemented in an operating system as a trap for intruders is called a:
A feature deliberately implemented in an operating system as a trap for intruders is called a:
Fault tolerance countermeasures are designed to combat threats to
Fault tolerance countermeasures are designed to combat threats to
which of the following?
A ‘Psuedo flaw’ is which of the following?
What Distributed Computing Environment (DCE) component provides a mechanism to ensure that services are made a
What Distributed Computing Environment (DCE) component provides a mechanism to ensure that
services are made available only to properly designated parties?
What can be accomplished by storing on each subject a list of rights the subject has for every object?
What can be accomplished by storing on each subject a list of rights the subject has for every
object?
what relates two versions of the same object?
In the Information Flow Model, what relates two versions of the same object?
What is a security requirement that is unique to Compartmented Mode Workstations (CMW)?
What is a security requirement that is unique to Compartmented Mode Workstations (CMW)?
which distinct categories?
The Common Criteria (CC) represents requirements for IT security of a product or system under
which distinct categories?