Computer System Security: Reference Monitor and TCB
10 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the role of the Reference Monitor in computer system security?

  • It provides core security functions in computer systems
  • It creates active OS processes that act on behalf of principles
  • It checks whether access requests to resources should be authorized
  • It mediates all access requests to computer resources (correct)

What is the TCB in computer systems?

  • A guard mechanism that checks whether access requests to resources should be authorized
  • A part of computer systems that provides core security functions (correct)
  • An abstract access control concept that mediates all access requests to computer resources
  • The implementation of any reference monitor

What are principles in the context of computer system security?

  • Active OS processes that act on behalf of principles
  • The users or entities that make access requests to system resources
  • Users or entities that make decisions about making system access requests as if they were users (correct)
  • The passive system resources such as access to files, directories, printers

What do subjects represent in the context of computer system security?

<p>The active OS processes that act on behalf of principles (B)</p> Signup and view all the answers

Where can a reference monitor be placed in an operating system?

<p>In the OS kernel (B)</p> Signup and view all the answers

What is the purpose of the reference monitor?

<p>To establish the validity of an access request and make an access decision (C)</p> Signup and view all the answers

What does the trusted computing base (TCB) control access to?

<p>Computing resources (B)</p> Signup and view all the answers

What are some common placements of the reference monitor?

<p>Stack, sandboxed, embedded (B)</p> Signup and view all the answers

What must the trusted computing base (TCB) actively prevent?

<p>Misuse of the OS and external actors (C)</p> Signup and view all the answers

What are some responsibilities of the trusted computing base (TCB)?

<p>Isolation of objects and memory protection (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser