As a general rule, secure systems designers should use complex security mechanis
ID: 3874287 • Letter: A
Question
As a general rule, secure systems designers should use complex security mechanisms to prevent their systems being easily compromised.
a. true
b. false
A sandbox is a technique by which a downloaded program is executed is such a way that each of its instructions can be fully controlled. If an attempt is made to execute an instruction that has been forbidden by the host, execution of the program will be stopped.
a. true
b. false
In practice, access to any part of a distributed system is controlled by a special kind of reference monitor known as a firewall.
a. true
b. false
With distributed systems, the security environment consists of multiple administrative domains.
a. true
b. false
In the Reduced Interfaces for Secure System Components (RISSC) approach, any security-critical server will be placed on a separate machine isolated from end-user systems using low-level secure network interfaces.
a. true
b. false
Explanation / Answer
1)
a) true
explanation:
there are five secure system design by basic principle
Integrality
invariantness
unfication principle
Adequete principle
correctness principle
By intergrality priciple secure systems designers should use complex security mechanisms to prevent their systems being easily compromised.
2)
a)True
explanation:
Sandbox technique run the host instruction by Virtual Machine Host
So it terminate the process and the program will stop(or run out of the processs)
3)
a) TRUE
4)
a) true
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.