Quiz 3 Flashcards
An object is said to have security clearance of a given level; whereas a subject is said to have a security classification of a given level
a) True
b) False
b) False
The Chinese Wall Model (CWM) incorporates both discretionary and mandatory access concepts
a) True
b) False
a) True
Kernel Mode allows privileged instructions to be executed and privileged areas of memory to be accessed
a) True
b) False
a) True
Well-Formed Transactions are when users can manipulate the data arbitrarily to be able to complete transactions.
a) True
b) False
b) False
One strength of the attribute-based access control (ABAC) model is the improved performance when evaluating predicates on both resource and user properties for each access.
a) True
b) False
b) False
Row-level granularity for database security does not cause any problems with inference from the data returned by the query in question.
a) True
b) False
a) True
ACL is per object, whereas a capability list is per user.
a) True
b) False
a) True
A multilevel secure system for confidentiality must enforce No write up and No read down.
a) True
b) False
b) False
The BLP (Bell-LaPadula) model was developed as a formal model for access control.
a) True
b) False
a) True
The term identity federation is used to describe the technology, standards, policies, and processes that allow an organization to trust digital identities, identity attributes, and credentials created and issued by another organization.
a) True
b) False
a) True
In Access Management, this element determines what is allowable and unallowable in an access transaction.
a) Resource Management
b) Privilege Management
c) Policy Management
d) All of the above
e) None of the above
c) Policy Management
In the Attribute-Based Access Control (ABAC) model, entities such as files, tables, programs, and networks are considered:
a) Subjects
b) Objects
c) Environments
d) All of the above
e) None of the above
b) Objects
In the Traditional UNIX approach (minimal access control list), the filesystem uses these classes for File Access Control.
a) Owner Class
b) Group Class
c) Other Class
d) All of the above
e) None of the above
d) All of the above
The Bell-Lapadula model considers which of the following access modes:
a) Modify
b) Observer
c) Execute
d) Invoke
e) All of the above
f) None of the above
f) None of the above
Which of the following is not a functional component of a trusted platform module (TPM).
a) Execution engine
b) Nonvolatile memory
c) Key generation
d) Powerline modulator
e) Opt-in
d) Powerline modulator