1.
Which of the following statements pertaining to the security kernel is incorrect?
2.
Which of the following best corresponds to the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location?
3.
Which of the following security mode of operation does NOT require all users to have the clearance for all information processed on the system?
4.
What prevents a process from accessing another process' data?
5.
What can best be defined as the sum of protection mechanisms inside the computer, including hardware, firmware and software?
6.
A trusted system does NOT involve which of the following?
7.
What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
8.
A Security Kernel is defined as a strict implementation of a reference monitor mechanism responsible for enforcing a security policy. To be secure, the kernel must meet three basic conditions, what are they?
9.
What can best be defined as the detailed examination and testing of the security features of an IT system or product to ensure that they work correctly and effectively and do not show any logical vulnerabilities, such as evaluation criteria?
10.
Which of the following is NOT a common integrity goal?