Podcast
Questions and Answers
What is the role of the Reference Monitor in computer system security?
What is the role of the Reference Monitor in computer system security?
- It provides core security functions in computer systems
- It creates active OS processes that act on behalf of principles
- It checks whether access requests to resources should be authorized
- It mediates all access requests to computer resources (correct)
What is the TCB in computer systems?
What is the TCB in computer systems?
- A guard mechanism that checks whether access requests to resources should be authorized
- A part of computer systems that provides core security functions (correct)
- An abstract access control concept that mediates all access requests to computer resources
- The implementation of any reference monitor
What are principles in the context of computer system security?
What are principles in the context of computer system security?
- Active OS processes that act on behalf of principles
- The users or entities that make access requests to system resources
- Users or entities that make decisions about making system access requests as if they were users (correct)
- The passive system resources such as access to files, directories, printers
What do subjects represent in the context of computer system security?
What do subjects represent in the context of computer system security?
Where can a reference monitor be placed in an operating system?
Where can a reference monitor be placed in an operating system?
What is the purpose of the reference monitor?
What is the purpose of the reference monitor?
What does the trusted computing base (TCB) control access to?
What does the trusted computing base (TCB) control access to?
What are some common placements of the reference monitor?
What are some common placements of the reference monitor?
What must the trusted computing base (TCB) actively prevent?
What must the trusted computing base (TCB) actively prevent?
What are some responsibilities of the trusted computing base (TCB)?
What are some responsibilities of the trusted computing base (TCB)?