Answer: A
Hint: Tne correct answer is A. The other options are not prohibited by the model.
Answer: C
Hint: The correct answer is C by definition of the property.
Answer: A
Hint: The correct answer is A. The Clark-Wilson model is an integrity model.
Answer: B
Answer: C
Hint: The correct answer is C. Answers A, B, and D are parts of the Clark-Wilson model.
Answer: B
Answer: D
Hint: The correct answer is D. The Biba model is an integrity model. Answer A is associated with confidentiality. Answers B and C are specific to the Clark-Wilson model.
Answer: C
Answer: D
Hint: The correct answer is D. Answer A is incorrect because the access control list is not a row in the access control matrix. Answer B is incorrect because a tuple is a row in the table of a relational database. Answer C is incorrect because a domain is the set of allowable values a column or attribute can take in a relational database.
Answer: D
Hint: The correct answer is D. The Bell-LaPadula model addresses the confidentiality of classified material. Answers A and C are integrity models, and answer B is a distracter.
Answer: A
Hint: The correct answer is A. Answer B is the security perimeter. Answer C is the definition of a trusted path. Answer D is the definition of a trusted computer system.
Answer: A
Answer: D
Hint: The corrector answer is D. Answers A and B deal with security models, and answer C is a distracter.
Answer: C
Answer: B
Hint: The correct answer is B, a distracter. Answer A is Part 1 of the CC. It defines general concepts and principles of information security and defines the contents of the Protection Profile (PP),Security Target (ST), and the Package. The Security Functional Requirements, answer C, are Part 2 of the CC, which contains a catalog of well-defined standard means of expressing security requirements of IT products and systems. Answer D is Part 3 of the CC and comprises a catalog of a set of standard assurance components.
Answer: C
Hint: The correct answer is C, by definition of a trusted system. Answers A and B refer to open, standard information on a product as opposed to a closed or proprietary product. Answer D is distracter.
Answer: A
Hint: The correct answer is A, the two conditions required for a fault-tolerant system. Answer B is a distracter. Answer C is the definition of fail safe, and answer D refers to starting after a system shutdown.
Answer: B
Answer: C
Hint: The correct answer is C. Answer A, ST, is a statement of security claims for a particular IT product or system. A Package, answer B, is defined in the CC as "an intermediate combination of security requirement components." A TOE, answer D is "an IT product or system to be evaluated."
Answer: C
Answer: C
Hint: The correct answer is C. Product-specific security requirements for the product or system are contained in the Security Target (ST). Additional items in the PP are :
- TOE security environment drscription
- Assumptions about the security aspects of the product's expected use
- Organizational security policies or rules
- Application notes
- Rationale
Answer: A
Hint: The correct answer is A. Answer B is context-dependent control. Answers C and D are distracters.
Answer: A
Hint: The correct answer is A. Failover means switching to a "hot" backup system that maintains duplicate states with the primary system. Answer B refers to fail safe, and answers C and D refer to fail soft.
Answer: A
Hint: The correct answer is A. Answer B refers to secondary storage. Answer C refers to virtual memory, and answer D refers to sequential memory.
Answer: D
Hint: The correct answer is D. Answer A is a distracter. Answer B is the product to be evaluated. Answer C refers to TCSEC.
Answer: A
Hint: The correct answer is A. Answer B refers to content-dependent characteristics, and answers C and D are distracters
Answer: B
Hint: Answer A, trusted distribution, ensures that valid and secure versions of software have been received correctly. Trusted facility management, answer C is concerned with the proper operation of trusted facilities as well as system administration and configuration. Answer D, the security perimeter, is the boundary that separates the TCB from the remainder of the system. Recall that the TCB is the totality of protection mechanisms within a computer system that are trusted to enforce a security policy.
Answer: C
Answer: D
Answer: D
Hint: The correct answer is D. RAM is volatile. The other answers are incorrect because RAM is volatile, randomly accessible, and not programmed by fusible links.
Answer: C
Hint: Answer A is the NLACAP system accreditation. Answer B is the Phase 2 or verification phase of the Defense Information Technology. Security Certification and Accreditation Process (DITSCAP). The objective is to use the SSAA to establish an evolving yet binding agreement on the level of security required before the system development begins or changes to a system are made. After accreditation, the SSAA becomes the baseline security configuration document. Answer D is the NLACAP site accreditation.
Answer: A
Hint: The correct answer is A. A process is placed in the ring that gives it the minimum privileges necessary to perform its functions.
Answer: D
Hint: The correct answer is D. Multics is based on the ring protection architecture.
Answer: B
Hint: The correct answer is B.