Exam 6: Security Management Models
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
The information security blueprint serves as the basis for the design,selection,and implementation of all subsequent security controls._________________________
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
Storage of classified documents must be accessible only to authorized individuals,which usually requires which of the following?
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
D
ISO 27002 is an international standard for computer security certification,considered to be the successor to both TCSEC and ITSEC.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
Controls that are structured and coordinated within a data classification scheme that rates each collection of information as well as each user are called ____.
(Multiple Choice)
4.8/5
(29)
Deterrent controls help an organization avoid an incident._________________________
(True/False)
4.9/5
(38)
Discretionary controls are determined by a central authority in the organization._________________________
(True/False)
4.8/5
(42)
The Biba model is a state machine model that helps ensure the confidentiality of an information system by means of MACs,data classification,and security clearances._________________________
(True/False)
4.7/5
(38)
Under the Common Criteria,____ is the document describing the system being evaluated's security properties.
(Multiple Choice)
4.8/5
(37)
Covert channels are unauthorized or unintended methods of communications hidden inside a computer system._________________________
(True/False)
4.7/5
(26)
ITSEC is the international set of equivalent for evaluating computer systems,and is very similar to the TCSEC.
(True/False)
4.9/5
(39)
The principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties is known as ____.
(Multiple Choice)
4.9/5
(31)
The individual categories of data classification (Unclassified,Confidential,Secret etc.)are also called ____.
(Multiple Choice)
5.0/5
(32)
ISO/IEC 27001 provieds implementation details using a(n)____________________ cycle.
(Short Answer)
4.8/5
(31)
Access controls are build on three key principles.List and briefly define them.
(Essay)
4.7/5
(30)
The Graham-Denning model most closely represents which of the following access control models?
(Multiple Choice)
4.7/5
(30)
Under the Biba model,the ____ property permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object.
(Multiple Choice)
4.9/5
(33)
COBIT is an IT development framework and supporting toolset that allows managers to bridge the gap between control requirements,technical issues,and design specifications.
(True/False)
4.7/5
(37)
The Clark-Wilson model,designed for commercial environments is a(n)____ model.
(Multiple Choice)
4.8/5
(36)
Under the Common Criteria for IT Security Evaluation,a(n)Security Target is the system being evaluated._________________________
(True/False)
4.8/5
(39)
Showing 1 - 20 of 120
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)