ISC Exam Questions

what Access Control method to protect the integrity of processes and data?

LOMAC uses what Access Control method to protect the integrity of processes and data?

A.
Linux based EFS.

B.
Low Water-Mark Mandatory Access Control.

C.
Linux based NFS.

D.
High Water-Mark Mandatory Access Control.

Explanation:
LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access
Control to protect the integrity of processes and data from viruses, Trojan horses,
malicious remote users and compromised root daemons. LOMAC is implemented as a loadable
kernel module – no kernel recompilations or changes to existing applications are
required. Although not all the planned features are currently implemented, it presently
provides sufficient protection to thwart script-kiddies, and is stable enough for
everyday use.