Exam 6: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Bell-LaPadula security rules prevent information from being moved from a level of higher security to a level of lower security.

(True/False)
4.8/5
(46)

Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.

(True/False)
4.9/5
(32)

Under lattice-based access controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)____.

(Multiple Choice)
4.8/5
(32)

____ controls cover security processes that are designed by the strategic planners and executed by security administrators.

(Multiple Choice)
4.9/5
(32)

One discretionary model is ____,in which access is granted based on a set of rules specified by the central authority.

(Multiple Choice)
4.7/5
(28)

Information Technology-Code of Practice for Information Security Management was originally published as British Standard BS7799.

(True/False)
4.7/5
(43)

One of the key elements of the Clark-Wilson model is the unconstrained data item which is a data item with protected integrity._________________________

(True/False)
4.8/5
(41)

To design a security blueprint,an organization can use a(n)____________________,which is a generic blueprint offered by a service organization.

(Short Answer)
4.7/5
(34)

The personnel security ____________________ structure assigns each user of an information asset an authorization level that identifies the level of information classification he or she can access.

(Short Answer)
4.8/5
(29)

Providing information security for the information and information systems that support the operations and assets under their control is the primary responsibility of which group under the InfoSec governance framework?

(Multiple Choice)
4.8/5
(37)

The primary objective of the Committee of Sponsoring Organizations of the Treadway Commission (COSO),a private-sector initiative formed in 1985,is to identify the factors that cause fraudulent financial reporting and to make recommendations to reduce its incidence._________________________

(True/False)
4.9/5
(31)

Nondiscretionary controls can be based on roles or on a specified set of ____________________.

(Short Answer)
4.8/5
(38)

In an access control matrix,as part of lattice-based controls,the column of attributes associated with a particular object (such as a printer)is referred to as a(n)capability table._________________________

(True/False)
4.9/5
(29)

Under the TCSEC model,the term ____ can be misleading-note that in this context,it means that components are part of the TCB security system,but it does not necessarily follow that they are all above reproach.

(Multiple Choice)
4.8/5
(32)

Within lattice-based access controls,the row of attributes associated with a particular subject (such as a user)is referred to as a capabilities table.

(True/False)
4.8/5
(34)

There are six access controls methodologies categorized by their inherent characteristics.List and briefly define them.

(Essay)
4.9/5
(27)

A convenience store safe that can only be opened during store hours is an example of the ____________________ isolation access control.

(Short Answer)
4.8/5
(38)

Under the Common Criteria,____ is the user-generated specifications for security requirements.

(Multiple Choice)
4.9/5
(40)

The ITSEC is the international set of criteria for evaluating computer systems and is very similar to the TCSEC._________________________

(True/False)
4.8/5
(34)

Which of the following is the primary purpose of ISO/IEC 27001:2005?

(Multiple Choice)
4.7/5
(37)
Showing 61 - 80 of 120
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)