Exam 8: Security Management Models
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Access controls are build on three key principles.List and briefly define them.
(Essay)
4.9/5
(24)
When copies of classified information are no longer valuable or too many copies exist,what steps should be taken to destroy them properly? Why?
(Essay)
5.0/5
(38)
Which of the following is NOT one of the three levels in the U.S.military data classification scheme for National Security Information?
(Multiple Choice)
4.7/5
(42)
The ____________________ principle is based on the requirement that people are not allowed to view data simply because it falls within their level of clearance.
(Short Answer)
4.9/5
(36)
Which type of access controls can be role-based or task-based?
(Multiple Choice)
4.7/5
(34)
Which of the following specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle?
(Multiple Choice)
4.8/5
(38)
What are the two primary access modes of the Bell-LaPadula model and what do they restrict?
(Essay)
5.0/5
(40)
The data access principle that ensures no unnecessary access to data exists byregulating members so they can perform only the minimum data manipulation necessary is known as minimal privilege.____________
(True/False)
4.8/5
(44)
Under what circumstances should access controls be centralized vs.decentralized?
(Essay)
4.9/5
(42)
There are seven access controls methodologies categorized by their inherent characteristics.List and briefly define them.
(Essay)
4.8/5
(33)
Which of the following is NOT a category of access control?
(Multiple Choice)
4.8/5
(40)
According to COSO,internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in what three categories?
(Essay)
4.8/5
(34)
Which of the following is the primary purpose of ISO/IEC 27001:2005?
(Multiple Choice)
4.7/5
(36)
A security monitor is a conceptual piece of the system within the trusted computer basethat manages accesscontrols-in other words,it mediates all access to objects by subjects.____________
(True/False)
4.9/5
(32)
Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec,and was created by ISACA and the IT Governance Institute?
(Multiple Choice)
4.7/5
(30)
A TCSEC-defined covert channel,which transmit information by managing the relative timing of events.
(Multiple Choice)
4.7/5
(29)
Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones.
(Multiple Choice)
4.9/5
(36)
A framework or security model customized to anorganization,including implementation details.
(Multiple Choice)
4.8/5
(32)
The information security principle that requires significant tasks to besplit up so that more than one individual is required to complete them is called isolation of duties.____________
(True/False)
4.7/5
(34)
Requires that significant tasks be split up in such a way that more than one individual is responsible for their completion.
(Multiple Choice)
5.0/5
(40)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)