Which of the following is commonly used for retrofitting multilevel security to a database management system?
A.
trusted front-end
B.
trusted back-end
C.
controller
D.
kernel
Explanation:
In a multilevel security (MLS) database system, a trusted front-end is configured. Users connect to the trusted
front-end and the trusted front-end connects to the database system.
The trusted front end is responsible for directing queries to the correct database processor, for ensuring that
there is no illegal flow of information between the database processors, for maintaining data consistency
between replicated database fragments, and for properly labeling query responses and sending them back to
the appropriate user. In addition, the trusted front end is responsible for user identification and authentication,
maintenance of the trusted path to the user, and auditing.
Incorrect Answers:
B: A trusted back-end is not configured. The back-end would be the database system. Users connect to a
trusted-front end which in turn connects to the back-end database system.
C: A ‘controller’ is not the correct term for a system that is configured for a multilevel security database system.
D: A kernel is the heart of an operating system. This is not what is configured for a multilevel security database
system.http://www.acsac.org/secshelf/book001/19.pdf