Secure Operating System
Description: Designing secure operating system Operating Systems with Case Study of UnixOperating SystemOperating System | |
Number of Questions: 20 | |
Created by: Supriya Thakkar | |
Tags: Designing secure operating system Operating Systems with Case Study of Unix Operating System |
The combination of key exchange, hash and encryption algorithm defines a cipher suit in which of the following security mechanisms?
In which of the following security policies, there may also be some corporate-level responsibilities such as accounting and personnel activities?
In which of the following security models, users can also be ranked by the degree of information to which they can have access?
Which of the following security standards defines the format and handling of e-mail attachments?
The security policy implemented by which of the following security techniques is somewhat more complex than the action of a proxy?
In which of the following security policies, access is allowed if the object is requested in the same company group as an object that has been accessed previously?
In which of the following security features of a trusted operating system, the owner can determine who should have access rights to an object and what those rights should be?
In which of the following security features of the operating system, access to the general objects must be controlled so that one user does not have a negative effect on other users?
Which of the following security features of the operating system brings about the need to guarantee integrity and consistency?
Which of the following security mechanisms enables cardholders to verify that a merchant has a relationship with a financial institution allowing it to accept payment cards?
Which of the following security models is to enable us to build systems with ability to execute parallel tasks with different levels of sensitivity?
Which of the following security features of the operating system builds pattern of normal system usage and triggers an alarm any time the usage seems abnormal?
Which of the following security techniques works on one packet at a time, allowing or denying each packet of information before moving on to the next one?
Which of the following security standards performs some or all of the following actions such as message integrity, message authenticity etc.?
Which of the following security models defines integrity levels which are analogous to the sensitivity levels of the Bell-la padula model?
Which of the following features of the operating system is mediated by access control tables?
In which of the following security techniques, a company wants to allow dial-in access by its employees, without exposing its company resources to login attacks from remote non-employees?
In which of the following principles applied in the design element of the operating system, each user and each program should operate by using the fewest privileges possible?
In which of the following security techniques, packets can arrive in any order and the protocol suit is responsible for assembling the packet stream in proper order before passing it along the application?
In which of the following security features of the operating system, a security-relevant action may be as simple as an individual access to an object such as file?