TPM ISO11889 Standards

Εξοδος

Ερώτηση 1 of 1

  Υπολειπόμενος Χρόνος


0 [{"id":46774,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:23:57","updated_at":"2016-03-20 13:37:24","questionName":"Protects keys and data entrusted to the TPM.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46783,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:29:18","updated_at":"2016-03-20 13:37:24","questionName":"Contains a summary of all the measured values and their ordering. They are temporal and reset at system reboot","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46746,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:11:19","updated_at":"2016-03-20 13:37:24","questionName":"Instructions executed by the platform when it acts as the RTM.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46761,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:17:43","updated_at":"2016-03-20 13:37:24","questionName":"In Transitive Trust, this gives a trustworthy description of a second group of functions.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46729,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:01:46","updated_at":"2016-03-20 13:37:24","questionName":"What is the title for ISO\/IEC 11889?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46768,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:20:40","updated_at":"2016-03-20 13:37:24","questionName":"A trusted platform provides the functions of protected storage, measurement and reporting to vouch for accuracy of information. This is related to:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46750,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:12:30","updated_at":"2016-03-20 13:37:24","questionName":"The parts of the Roots of Trust that do not have shielded locations.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46779,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:27:05","updated_at":"2016-03-20 13:37:24","questionName":"The process of obtaining metrics of platform characteristics that affect the integrity (trustworthiness) of a platform and putting digests of those metrics in PCRs.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46743,"quiz_id":"3787","answer_id":null,"answerType_id":"1","created_at":"2016-03-20 13:09:50","updated_at":"2016-03-20 13:37:24","questionName":"There are commonly three Roots of Trust in a trusted platform; RTS, RTM and RTR. Fill in the blanks of the three.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46772,"quiz_id":"3787","answer_id":null,"answerType_id":"2","created_at":"2016-03-20 13:22:54","updated_at":"2016-03-20 13:37:24","questionName":"Attestation can be understood in four dimensions. Match the dimensions with the definition.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46788,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:32:44","updated_at":"2016-03-20 13:37:24","questionName":"Places (memory, register, etc.) where it is safe to operate on sensitive data (data locations that can be accessed only by protected capabilities).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46739,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:08:11","updated_at":"2016-03-20 13:37:24","questionName":"Components that must be trusted because misbehavior may not be detected.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46757,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:15:11","updated_at":"2016-03-20 13:37:24","questionName":"Components that form a Trust Boundary","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46734,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:05:52","updated_at":"2016-03-20 13:37:24","questionName":"A Trusted Platform contains two of which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46764,"quiz_id":"3787","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 13:18:57","updated_at":"2016-03-20 13:37:24","questionName":"Process where the Root of Trust gives a trustworthy description of a second group of functions.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
46774
0
120
block

Protects keys and data entrusted to the TPM.

Επιλέξτε τις σωστές απαντήσεις  

(0/0)












46783
0
120
none
46746
0
120
none
46761
0
120
none
46729
0
120
none
46768
0
120
none
46750
0
120
none
46779
0
120
none
46743
0
120
none
46772
0
120
none
46788
0
120
none
46739
0
120
none
46757
0
120
none
46734
0
120
none
46764
0
120
none