a. Application executing in privileged mode
b. Inadequate memory segmentation
c. Inadequate protection ring use
d. Insufficient parameter checking
a. Memory allocation -T
b. Input and output tasks -T
c. Resource allocation -T
d. User access to database views -F
a. Disclosure of residual data
b. Unauthorized access to privileged processes
c. Data leakage through covert channels
d. Compromising the execution domain
a. A software component that monitors activity and writes security events to an audit log
b. A software component that determines if a user is authorized to perform a requested operation
c. A software component that isolates processes and separates privilege and user modes
d. A software component that works in the center protection ring and provides interfaces between trusted and un-trusted objects (Security Perimeter)
a. Require the user to perform object reuse operations.
b. Associate this identity with all auditable actions taken by that individual.
c. Associate this identity with all processes the user initiates.
d. Require that only that user have access to his specific audit information.
a. All trusted processes and software components
b. All trusted security policies and implementation mechanisms
c. All trusted software and design mechanisms
d. All trusted software and hardware components
a. Reference monitor
b. Security kernel
c. Security perimeter
d. Security policy
a. Reference monitor
b. Resource manager
c. Memory mapper
d. Security perimeter – Leo thinks this is the best answer (if you wanted to know)
a. Processes are contained within their own security domains so that each does not make unauthorized accesses to other objects or their resources
b. Processes are contained within their own security perimeter so that they can only access protection levels above them
c. Processes are contained within their own security perimeter so that they can only access protection levels equal to them
d. The separation is hardware and not logical in nature