Exam 8: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Information Technology Infrastructure Library (ITIL)is a collection of policies andpractices for managing the development and operation of IT infrastructures.____________

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

One of the TCSEC's covert channels,which communicate by modifying a stored object.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

G

Which of the following is NOT a change control principle of the Clark-Wilson model?

(Multiple Choice)
4.8/5
(46)

Information Technology Infrastructure Library provides guidance in the development and implementation of an organizational InfoSec governance structure.

(True/False)
5.0/5
(28)

To design a security program,an organization can use a(n)____________________,which is a generic outline of the more thorough and organization-specific blueprint offered by a service organization.

(Short Answer)
4.7/5
(29)

What are the five principles that are focused on the governance and management of IT as specified by COBIT 5?

(Essay)
4.9/5
(38)

Which of the following is a generic blueprint offered by a service organization which must be flexible,scalable,robust,and detailed?

(Multiple Choice)
4.9/5
(42)

Lattice-based access control specifies the level of access each subject has to each object,if any.

(True/False)
4.9/5
(38)

Controls access to a specific set of information based on its content.

(Multiple Choice)
4.9/5
(30)

Controls implemented at the discretion or option of the data user.

(Multiple Choice)
4.9/5
(40)

____________________ channels are unauthorized or unintended methods of communications hidden inside a computer system,and include storage and timing channels.

(Short Answer)
4.8/5
(28)

A form of nondiscretionary control where access is determined based on the tasks assigned to a specified user.

(Multiple Choice)
4.7/5
(29)

In information security,a specification of a model to be followed during the design,selection,and initial and ongoing implementation of all subsequent security controls is known as a blueprint.____________

(True/False)
4.8/5
(35)

Under lattice-based access controls,the column of attributes associated with a particular object (such as a printer)is referred to as which of the following?

(Multiple Choice)
4.8/5
(31)

In a lattice-based access control,a restriction table is the row of attributes associated with aparticular subject (such as a user). ____________

(True/False)
4.8/5
(33)

Within TCSEC,the combination of all hardware,firmware,andsoftware responsible for enforcing the security policy.

(Multiple Choice)
4.9/5
(36)

Which piece of the Trusted Computing Base's security system manages access controls?

(Multiple Choice)
4.8/5
(41)

Which control category discourages an incipient incident?

(Multiple Choice)
4.9/5
(41)

Lattice-based access controls use a two-dimensional matrix to assign authorizations,what are the two dimensions and what are they called?

(Essay)
4.9/5
(41)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)