Page 543 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 543

B.  The operating system kernel and device drivers

                    C.  The combination of hardware, software, and controls that work
                        together to enforce a security policy


                    D.  The software and controls that certify a security policy

              10.  What is a security perimeter? (Choose all that apply.)

                    A.  The boundary of the physically secure area surrounding your
                        system

                    B.  The imaginary boundary that separates the TCB from the rest of
                        the system

                    C.  The network where your firewall resides

                    D.  Any connections to your computer system

               11.  What part of the TCB concept validates access to every resource

                    prior to granting the requested access?

                    A.  TCB partition

                    B.  Trusted library

                    C.  Reference monitor

                    D.  Security kernel

               12.  What is the best definition of a security model?

                    A.  A security model states policies an organization must follow.

                    B.  A security model provides a framework to implement a security
                        policy.


                    C.  A security model is a technical evaluation of each part of a
                        computer system to assess its concordance with security
                        standards.

                    D.  A security model is the process of formal acceptance of a
                        certified configuration.

               13.  Which security models are built on a state machine model?

                    A.  Bell-LaPadula and Take-Grant
   538   539   540   541   542   543   544   545   546   547   548