Exam 8: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The principle of limiting users' access privileges to the specific informationrequired to perform their assigned tasks is known asneed-to-know.____________

(True/False)
4.8/5
(36)

A time-release safe is an example of which type of access control?

(Multiple Choice)
4.8/5
(37)

Under the Clark-Wilson model,internal consistency means that the system is consistent with similar data in the outside world.

(True/False)
4.8/5
(34)

The COSO framework is built on five interrelated components.Which of the following is NOT one of them?

(Multiple Choice)
4.9/5
(34)

Which security architecture model is part of a larger series of standards collectively referred to as the "Rainbow Series"?

(Multiple Choice)
4.9/5
(32)

In which form of access control is access to a specific set of information contingent on its subject matter?

(Multiple Choice)
4.8/5
(42)

Under the Common Criteria,which term describes the user-generated specifications for security requirements?

(Multiple Choice)
4.9/5
(30)

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?

(Multiple Choice)
4.7/5
(43)

In information security,a framework or security model customized to anorganization,including implementation details is known as afloorplan._____________

(True/False)
4.7/5
(44)

Access is granted based on a set of rules specified by the central authority.

(Multiple Choice)
4.8/5
(34)

In the COSO framework,___________ activities include those policies and procedures that support management directives.

(Short Answer)
4.8/5
(36)

Which access control principle limits a user's access to the specific information required to perform the currently assigned task?

(Multiple Choice)
4.8/5
(38)

ISO/IEC 27001 provides implementation detailson how to implement ISO/IEC 27002 and how to set up a(n)____________________.

(Short Answer)
5.0/5
(36)

Dumpster delvingis an information attack that involves searching through a target organization'strash and recycling bins for sensitive information.____________

(True/False)
4.8/5
(28)

One approach used to categorize access control methodologies categorizes controls based on their operational impact on the organization.What are these categories as described by NIST?

(Essay)
4.9/5
(42)

What is the data classification for information deemed to be National Security Information for the U.S.military as specified in 2009 in Executive Order 13526?

(Essay)
5.0/5
(39)

A person'ssecurity clearance is a personnel security structure in which each user of an information asset isassigned an authorization level that identifies the level of classified information he or she iscleared to access.____________

(True/False)
4.8/5
(41)

A security blueprint is the outline of the more thorough security framework.

(True/False)
4.8/5
(33)

Ratings of the security level for a specified collection of information (or user)within a mandatory access control scheme.

(Multiple Choice)
4.8/5
(43)

Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.

(True/False)
4.8/5
(41)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)