System high-security mode is incorrect. It is the mode of operation in which system hardware or software is trusted to provide only need-to-know protection between users. In this mode, the entire system, to include all components electrically and/or physically connected, must operate with security measures commensurate with the highest classification and sensitivity of the information being processed and/or stored. All system users in this environment must possess clearances and authorizations for all information contained in the system, and all system output must be clearly marked with the highest classification and all system caveats, until the information has been reviewed manually by an authorized individual to ensure appropriate classifications and caveats have been affixed.
Partitioned mode is incorrect. It is a mode of operation in which all persons have the clearance, but not necessarily the need-to-know and formal access approval, for all data handled by a computer system.
57. Which of the following is
a.
Character documentsb.
Trigger actions automaticallyc.
Portable instructionsd.
Interpretable contentActive content technologies allow code, in the form of a script, macro, or other kind of portable instruction representation, to execute when the document is rendered. Examples of active content include PostScript documents, Web pages containing Java applets and JavaScript instructions, proprietary desktop-application formatted files containing macros, spreadsheet formulas, or other interpretable content, and interpreted electronic mail formats having embedded code or bearing executable attachments. Electronic mail and Web pages accessed through the Internet provide efficient means for conveying active content, but they are not the only ones. Active content technologies span a broad range of products and services, and involve various computational environments including those of the desktop, workstations, servers, and gateway devices.
58. Which of the following creates a covert channel?
a.
Use of fixed labelsb.
Use of variable labelsc.
Use of floating labelsd.
Use of nonfloating labels59. Attackers installing spyware and connecting the computing platform to a botnet are examples of which of the following?
a.
Browser-oriented attacksb.
Server-oriented attacksc.
Network-oriented attacksd.
User-oriented attacks60. Which of the following is applied to all aspects of a system design or security solution?
a.
Policyb.
Procedurec.
Standardd.
Control61. A system employs sufficient hardware and software integrity measures to allow its use for processing simultaneously a range of sensitive or classified information. Which of the following fits this description?
a.
Boundary systemb.
Trusted systemc.
Open systemd.
Closed system