0

Secure Operating System

Description: Designing secure operating system Operating Systems with Case Study of UnixOperating SystemOperating System
Number of Questions: 20
Created by:
Tags: Designing secure operating system Operating Systems with Case Study of Unix Operating System
Attempted 0/20 Correct 0 Score 0

The combination of key exchange, hash and encryption algorithm defines a cipher suit in which of the following security mechanisms?

  1. Secure socket layer

  2. Transport layer security

  3. Personal firewall

  4. Sender authenticity

  5. Message integrity check


Correct Option: A
Explanation:

The combination of key exchange, hash and encryption algorithm defines a cipher suit in this security mechanism.

In which of the following security policies, there may also be some corporate-level responsibilities such as accounting and personnel activities?

  1. Military security policy

  2. Security policy

  3. Commercial security policy

  4. Lattice model of access security

  5. Transport layer security


Correct Option: C
Explanation:

In this security policy, there may also be some corporate-level responsibilities such as accounting and personnel activities.

In which of the following security models, users can also be ranked by the degree of information to which they can have access?

  1. Lattice model of access security

  2. Multilevel security

  3. Military security policy

  4. Personal firewall

  5. Security policy


Correct Option: B
Explanation:

In this security model, users can also be ranked by the degree of sensitivity of information to which they can have access.

Which of the following security standards defines the format and handling of e-mail attachments?

  1. Secure multipurpose mail extension

  2. Message integrity check

  3. The certificate scheme

  4. Transport layer security

  5. Personal firewall


Correct Option: A
Explanation:

This security standard defines the format and handling of e-mail attachments.

The security policy implemented by which of the following security techniques is somewhat more complex than the action of a proxy?

  1. Personal firewall

  2. Transport layer security

  3. Non repudiation

  4. Military security policy

  5. Guard


Correct Option: E
Explanation:

The security policy implemented by this security technique is somewhat more complex than the action of a proxy.

In which of the following security policies, access is allowed if the object is requested in the same company group as an object that has been accessed previously?

  1. Military security policy

  2. Security policy

  3. Chinese wall security policy

  4. Lattice model of access security

  5. Transport layer security


Correct Option: C
Explanation:

In this security policy, access is allowed if the object is requested in the same company group as an object that has been accessed previously.

In which of the following security features of a trusted operating system, the owner can determine who should have access rights to an object and what those rights should be?

  1. Mandatory access control

  2. Complete mediation

  3. Input validation control

  4. Discretionary access control

  5. Output reconciliation control


Correct Option: D
Explanation:

In this security feature of trusted operating system, the owner can determine who should have access rights to an object and what those rights should be.

In which of the following security features of the operating system, access to the general objects must be controlled so that one user does not have a negative effect on other users?

  1. Authentication of users

  2. Allocation and access control

  3. Protection of memory

  4. Output reconciliation control

  5. Change management control


Correct Option: B
Explanation:

In this security feature of the operating system, access to the general objects must be controlled so that one user does not have a negative effect on other users.

Which of the following security features of the operating system brings about the need to guarantee integrity and consistency?

  1. Authentication of users

  2. Enforcement of sharing

  3. File and I/O device access control

  4. Mandatory access control

  5. Complete mediation


Correct Option: B
Explanation:

This security feature of the operating system brings about the need to guarantee integrity and consistency.

Which of the following security mechanisms enables cardholders to verify that a merchant has a relationship with a financial institution allowing it to accept payment cards?

  1. Military security policy

  2. Transport layer security

  3. Secure electronic transaction

  4. Personal firewall

  5. Proc-type


Correct Option: C
Explanation:

This security mechanism enables cardholders to verify that a merchant has a relationship with a financial institution allowing it to accept payment cards.

Which of the following security models is to enable us to build systems with ability to execute parallel tasks with different levels of sensitivity?

  1. Network model

  2. Lattice model of access security

  3. Military security policy

  4. Bell-la padula confidentiality model

  5. Personal firewall


Correct Option: D
Explanation:

This security model is to enable us to build systems with ability to execute parallel tasks with different levels of sensitivity.

Which of the following security features of the operating system builds pattern of normal system usage and triggers an alarm any time the usage seems abnormal?

  1. Intrusion detection

  2. Object reuse protection

  3. Complete meditation

  4. Mandatory access control

  5. Protection of memory


Correct Option: A
Explanation:

This security feature of the operating system builds patterns of normal system usage and triggers an alarm any time the usage seems abnormal.

Which of the following security techniques works on one packet at a time, allowing or denying each packet of information before moving on to the next one?

  1. Personal firewall

  2. Transport layer security

  3. Message integrity check

  4. Sender authentication

  5. Filtering firewall


Correct Option: E
Explanation:

This security technique works on one packet at a time, allowing or denying each packet of information before moving on to the next one.

Which of the following security standards performs some or all of the following actions such as message integrity, message authenticity etc.?

  1. The certificate scheme

  2. Good privacy

  3. Personal firewall

  4. Transport layer security

  5. Non repudiation


Correct Option: B
Explanation:

This security standards performs some or all of the following actions such as message integrity, message authenticity etc..

Which of the following security models defines integrity levels which are analogous to the sensitivity levels of the Bell-la padula model?

  1. Lattice model of access security

  2. Network model

  3. Military security policy

  4. Biba integrity model

  5. Transport layer security


Correct Option: D
Explanation:

This security model defines integrity levels which are analogous to the sensitivity levels of the Bell-la padula model.

Which of the following features of the operating system is mediated by access control tables?

  1. Complete meditation

  2. File and I/O device access control

  3. Mandatory access control

  4. Inter crosses communication

  5. Authentication of users


Correct Option: D
Explanation:

This security feature of the operating system is mediated by access control tables.

In which of the following security techniques, a company wants to allow dial-in access by its employees, without exposing its company resources to login attacks from remote non-employees?

  1. Personal firewall

  2. Transport layer security

  3. Message integrity check

  4. Military security policy

  5. Application proxy


Correct Option: E
Explanation:

In this security technique, a company wants to allow dial-in access by its employees, without exposing its company resources to login attacks from remote non-employees.

In which of the following principles applied in the design element of the operating system, each user and each program should operate by using the fewest privileges possible?

  1. Authentication of users

  2. Separation of privilege

  3. Ease of use

  4. File and I/O device access control

  5. Least privilege


Correct Option: E
Explanation:

In this principle applied in the design element of the operating system, each user and each program should operate by using the fewest privileges possible.

In which of the following security techniques, packets can arrive in any order and the protocol suit is responsible for assembling the packet stream in proper order before passing it along the application?

  1. Message integrity check

  2. Personal firewall

  3. Stateful inspection firewall

  4. Transport layer security

  5. Mandatory access control


Correct Option: C
Explanation:

In this security technique, packets can arrive in any order and the protocol suite is responsible for reassembling the packet stream in proper order before passing it along to the application.

In which of the following security features of the operating system, a security-relevant action may be as simple as an individual access to an object such as file?

  1. Object reuse protection

  2. Complete mediation

  3. Accountability and audit

  4. Mandatory access control

  5. Ease of use


Correct Option: C
Explanation:

In this security feature of the operating system, a security-relevant action may be as simple as an individual access to an object such as a file.

- Hide questions