Exam 6: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The information security blueprint serves as the basis for the design,selection,and implementation of all subsequent security controls._________________________

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

Storage of classified documents must be accessible only to authorized individuals,which usually requires which of the following?

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

D

ISO 27002 is an international standard for computer security certification,considered to be the successor to both TCSEC and ITSEC.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

Controls that are structured and coordinated within a data classification scheme that rates each collection of information as well as each user are called ____.

(Multiple Choice)
4.8/5
(29)

Deterrent controls help an organization avoid an incident._________________________

(True/False)
4.9/5
(38)

Discretionary controls are determined by a central authority in the organization._________________________

(True/False)
4.8/5
(42)

The Biba model is a state machine model that helps ensure the confidentiality of an information system by means of MACs,data classification,and security clearances._________________________

(True/False)
4.7/5
(38)

Under the Common Criteria,____ is the document describing the system being evaluated's security properties.

(Multiple Choice)
4.8/5
(37)

Covert channels are unauthorized or unintended methods of communications hidden inside a computer system._________________________

(True/False)
4.7/5
(26)

ITSEC is the international set of equivalent for evaluating computer systems,and is very similar to the TCSEC.

(True/False)
4.9/5
(39)

The principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties is known as ____.

(Multiple Choice)
4.9/5
(31)

The individual categories of data classification (Unclassified,Confidential,Secret etc.)are also called ____.

(Multiple Choice)
5.0/5
(32)

ISO/IEC 27001 provieds implementation details using a(n)____________________ cycle.

(Short Answer)
4.8/5
(31)

Access controls are build on three key principles.List and briefly define them.

(Essay)
4.7/5
(30)

The Graham-Denning model most closely represents which of the following access control models?

(Multiple Choice)
4.7/5
(30)

Under the Biba model,the ____ property permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object.

(Multiple Choice)
4.9/5
(33)

COBIT is an IT development framework and supporting toolset that allows managers to bridge the gap between control requirements,technical issues,and design specifications.

(True/False)
4.7/5
(37)

The Clark-Wilson model,designed for commercial environments is a(n)____ model.

(Multiple Choice)
4.8/5
(36)

Under the Common Criteria for IT Security Evaluation,a(n)Security Target is the system being evaluated._________________________

(True/False)
4.8/5
(39)

An Automated Teller Machine (ATM)is an example of a ____.

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 120
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)