|Which International Organization for Standardization standard is commonly referred to as the ‘common criteria’? 15408 27001 14000 22002.
The Reference Validation Mechanism that ensures the authorized access relationships between subjects and objects is implementing which of the following concept: The reference monitor. Discretionary Access Control. The Security Kernel. Mandatory Access Control.
What security problem is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects? Unauthorized obtaining of a privileged execution state. Disclosure of residual data. Denial of service through a deadly embrace. Data leakage through covert channels.
What is a trusted shell? It means that someone who is working in that shell cannot "bust out of it", and other processes cannot "bust into it". It means that it is a communications channel between the user, or program, and the kernel. It means that someone working in that shell can communicate with someone else in another trusted shell. It means that it won’t let processes overwrite other processes’ data.
Pervasive Computing and Mobile Computing Devices have to sacrifice certain functions. Which statement concerning those devices is false. In many cases, security services has been enhanced due to the lack of services available. These devices share common security concerns with other resource-constrained devices. In many cases, security services have been sacrificed to provide richer user interaction when processing power is very limited. Their mobility has made them a prime vector for data loss since they can be used to transmit and store information in ways that may be difficult to control.