Question 1

Which of the principles does having an all-powerful system administration account violate? Pick the best one.


Question 2

Which of the following reflects the principle of complete mediation?


Question 3

Which of the following underlie software security design principles?


Question 4

Which of the following underlie software security design principles?


Question 5

A virtual machine isolates its operating system and processes from the host it runs on. Which principle best reflects this?


Question 6

Considering the basic file access controls of Windows and Linux systems (called "systems" here), which of the following is true?


Question 7

To change to the root user, the su(1) program in FreeBSD requires that the user know the root password and that the user be a member of group 0. Which principle does this reflect? Pick the best one.