CISSP Orange Book

Exit

Question 1 of 1

  Time Left


0 [{"id":32794,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:06:52","updated_at":"2016-02-28 20:49:10","questionName":"The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45335,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:10:58","updated_at":"2016-03-17 02:10:58","questionName":"According to the Orange Book, which security level is the first to require a system to protect against covert timing channels?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32797,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:09:53","updated_at":"2016-02-28 20:49:10","questionName":"Enforces the authorized access relationships between subjects and objects of a system.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32796,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:09:02","updated_at":"2016-02-28 20:49:10","questionName":"The totality of protection mechanisms within a computer system -- including hardware, firmware, and software -- the combination of which is responsible for enforcing a security policy. ","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32802,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:14:33","updated_at":"2016-02-28 20:49:10","questionName":"Which of these levels of trust is a FORMALLY stated policy acceptable?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45325,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:03:39","updated_at":"2016-03-17 02:03:39","questionName":"The Orange Book describes four hierarchical levels to categorize security systems. Which of the following levels below require mandatory protection?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60416,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:08:56","updated_at":"2016-04-29 01:08:56","questionName":"Which of the following is the lowest TCSEC class wherein the systems must support separate operator and system administrator roles?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32801,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:14:02","updated_at":"2016-02-28 20:49:10","questionName":"Which of these levels of trust is an INFORMALLY stated policy acceptable?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60420,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:19:57","updated_at":"2016-04-29 01:19:57","questionName":"Which TCSEC (Orange Book) rating or level requires the system to clearly identify functions of the security administrator to perform security-related functions?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32799,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:11:04","updated_at":"2016-02-28 20:49:10","questionName":"The reference monitor must be invoked for every access decision, and must be impossible to bypass.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32798,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:10:37","updated_at":"2016-02-28 20:49:10","questionName":"The reference monitor must be tamperproof.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32800,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:11:30","updated_at":"2016-02-28 20:49:10","questionName":"The reference monitor must be small enough to be able to be analyzed and tested, and it must be possible to ensure that the testing is complete.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60421,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:21:01","updated_at":"2016-04-29 01:21:01","questionName":"Which TCSEC level is labeled Controlled Access Protection?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32793,"quiz_id":"3014","answer_id":null,"answerType_id":"1","created_at":"2016-02-11 22:01:35","updated_at":"2016-02-28 20:49:10","questionName":"The Orange Book defines four broad hierarchical divisions of security protection. What are the division of security protections starting at A, B, C, and D?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":32795,"quiz_id":"3014","answer_id":null,"answerType_id":"0","created_at":"2016-02-11 22:07:51","updated_at":"2016-02-28 20:49:10","questionName":"The trust that can be placed in a system, and the trusted ways the system can be proven to have been developed, tested, documented, maintained and delivered to a customer.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
32794
0
120
block

The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.

Select the Correct Answers  

(0/0)












45335
0
120
none
32797
0
120
none
32796
0
120
none
32802
0
120
none
45325
0
120
none
60416
0
120
none
32801
0
120
none
60420
0
120
none
32799
0
120
none
32798
0
120
none
32800
0
120
none
60421
0
120
none
32793
0
120
none
32795
0
120
none