单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()ASensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价BSecurity Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制CSensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制DSensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

单选题
Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()
A

Sensitivity Labels for subjects & objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价

B

Security Clearances for subjects & Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制

C

Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制

D

Sensitivity Labels for subjects & objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制


参考解析

解析: 暂无解析

相关考题:

A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

What is necessary for a subject to have read access to an object in a Multi-Level Security Policy?什么对于主体在多层安全策略中拥有对一个客体的访问权限是必要的?()A、The subject's sensitivity label must dominate the object's sensitivity label.主体的敏感性标识必须支配客体的敏感性标识B、The subject's sensitivity label subordinates the object's sensitivity label.主体的敏感性标识从属于客体的敏感性标识C、The subject's sensitivity label is subordinated by the object's sensitivity label.主体的敏感性标识被客体的敏感性标识从属D、The subject's sensitivity label is dominated by the object's sensitivity label.主体的敏感性标识以客体的敏感性标识为主体

What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()A、Security Module.安全模块B、Validation Module.验证模块C、Clearance Check.声明检查D、Reference Monitor.引用监视器

Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A、Sensitivity Labels for subjects objects and a "system high" evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B、Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C、Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D、Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()A、Sensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。B、Sensitivity Labels for subjectsobjects anda"system high"evaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。C、Security Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。D、Sensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。

What is a "system high" security policy?什么是一个“系统高”的安全策略?()A、A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据B、A system that contains only data of one security classification.只包含一个安全级别的数据C、A system with data that contains only data of the highest security classification.只包含最高安全级别的数据D、A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile

When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A、RJ-31xB、RJ-11C、RS-232D、DB-9

A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

下面哪一项访问控制模型使用安全标签(security labels)?()A、自主访问控制B、非自主访问控制C、强制访问控制D、基于角色的访问控制

Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()A、users, windows, and programs.用户,窗口,以及程序B、files, directories, and print queue文件、 目录和打印队列C、devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口D、files, directories, processes, and sockets.文件、目录,进程,以及接口

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

单选题A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()Afwtmp  /etc/security/failedloginBcat /etc/security/failedloginCwhoDalog -f /etc/security/failedlogin -o

多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal

单选题What is a "system high" security policy?什么是一个“系统高”的安全策略?()AA system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据BA system that contains only data of one security classification.只包含一个安全级别的数据CA system with data that contains only data of the highest security classification.只包含最高安全级别的数据DA system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

单选题Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()ASensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。BSensitivity Labels for subjectsobjects andasystem highevaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。CSecurity Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。DSensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题下面哪一项访问控制模型使用安全标签(security labels)?()A自主访问控制B非自主访问控制C强制访问控制D基于角色的访问控制

单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()AStrategic security planningBDisaster recoveryCImplementation securityDOperations security

单选题What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()ASecurity Module.安全模块BValidation Module.验证模块CClearance Check.声明检查DReference Monitor.引用监视器

单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()ARJ-31xBRJ-11CRS-232DDB-9

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization

单选题Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()Ausers, windows, and programs.用户,窗口,以及程序Bfiles, directories, and print queue文件、 目录和打印队列Cdevices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口Dfiles, directories, processes, and sockets.文件、目录,进程,以及接口