Term
|
Definition
According to the Orange Book, which is the first security rating that requires covert channel analysis? |
|
|
Term
CLARK WILSON INTEGRITY MODEL |
|
Definition
Which security model has these charateristics?
-
IVP Integrity Verification Process. Procedures that test the constrained data items to conform to integrity constraints
-
CDI Contrained data items. Data subject to integrity controls
-
UDI Uncontrained data items. Data not subject to integrity controls
|
|
|
Term
|
Definition
What device can operate in a:
Ready State - ready to process
Supervisory State - executing priviledge routine
Problem state - executing an application
Wait State - waiting for a specific event to finish |
|
|
Term
|
Definition
CPU operates in a "ready to process" state is referred as? |
|
|
Term
|
Definition
The CPU operates in a "executing a priviledge routine" is referred as? |
|
|
Term
|
Definition
The CPU is operating in a "executing an application" state is referred as? |
|
|
Term
|
Definition
The CPU is operating in a "waiting for a specific event to finish" is referred to as? |
|
|
Term
NON-LINEAR LAYER
KEY ADDITION LAYER
LINEAR MIXING LAYER |
|
Definition
Rijindael employs a round transformation that consists of multiple layers of transformations. What are those layers? |
|
|
Term
|
Definition
What evaluation criteria evaluates a product against a protection profile? |
|
|
Term
|
Definition
Which IEEE 802.11 protocol is used to provide confidentiality of wireless transmissions? |
|
|
Term
|
Definition
In a ring protection system, where is the operating system security kernel located? |
|
|
Term
|
Definition
Which type of processor can only process one instruction at a time? |
|
|
Term
|
Definition
With respect to the Common Criteria, what describes the statement of security claims for a particular IT product / system?
|
|
|
Term
|
Definition
What describes the system component that controls all of subjects to objects, works as an abstract machine and mediates all access to object, protecting objects from unauthorized access and modification? |
|
|
Term
|
Definition
How many assurance levels are defined in the CC model? |
|
|
Term
|
Definition
The following phases of accrediation is part of the?
post accrediation
validation
definition
verification |
|
|
Term
|
Definition
Which processor enables the concurrent execution of multiple instructions in the same pipeline stage? |
|
|
Term
|
Definition
Which statement is true for which security model ?
-
A subject cannot read data at a lower integrity level
-
A subject at integrity level X can only invoke a subject at the same or lower integrity levels
-
A subject cannot modify an object in a higher integrity level
|
|
|
Term
|
Definition
In which manner should integrity labels should be assigned when,
-
objects (not subjects) should be assigned as one of two integrity levels (UDI, CDI),
-
while subjects (not objects) should be assigned one of two integrity levels (certified, TP, uncertified procedures)?
|
|
|
Term
|
Definition
What rule states that a subject has only read access to objects whose security level is below the subjects current clearance level. This prevents a subject from getting access to information available in security levels higher than its current clearance level? |
|
|
Term
BELL-LAPADULA security model |
|
Definition
What security model rule states:
-
Supports both Mandatory and Discretionary Access Control
-
Is a Multilevel security system for enforcing access control in government and military applications
-
Enforces the simple security rule and the *-property rule
|
|
|
Term
|
Definition
What Common Criteria terminology represents a level of confidence in the security functions of an IT product or system? |
|
|
Term
Controlled Access Protection
C2 |
|
Definition
What hierarchical division of security level requires object/subject residual information protection? |
|
|
Term
|
Definition
What hierarchical division of security level requires
formal security verification methods to assure that the mandatory and discretionary security controls employed in the system can effectively protect classified or other sensitive information stored or processed by the system?
|
|
|
Term
|
Definition
What hierarchical division of security levels ensures
mandatory access control is enforced by security labels?
|
|
|
Term
|
Definition
What level of security requires security notifications to be sent, system must recover without compromising system, security admin role defined?
|
|
|
Term
B2 - Structured Protection
|
|
Definition
What security level requires security labels are required, trusted path & covert channel analysis performed, and separate administration functionality is provided? |
|
|
Term
|
Definition
What security level requires each data object must contains classification label and each subject must have a clearance level? |
|
|
Term
C1 -Discretionary Security Protection
|
|
Definition
What level of security requires protected execution domain and discretionary access control? |
|
|
Term
|
Definition
What level of security requires the system provides minimal security?
|
|
|
Term
|
Definition
What rule states that a subject cannot modify an object in a higher integrity level? |
|
|
Term
Multi-level security mode, Compartmental security mode, Dedicated security model, and System-High security mode |
|
Definition
What are the Security modes of operation that describe the security state of a system as it is actually operating? |
|
|