Exam 8: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Access controls are build on three key principles.List and briefly define them.

(Essay)
4.9/5
(24)

When copies of classified information are no longer valuable or too many copies exist,what steps should be taken to destroy them properly? Why?

(Essay)
5.0/5
(38)

Which of the following is NOT one of the three levels in the U.S.military data classification scheme for National Security Information?

(Multiple Choice)
4.7/5
(42)

The ____________________ principle is based on the requirement that people are not allowed to view data simply because it falls within their level of clearance.

(Short Answer)
4.9/5
(36)

Which type of access controls can be role-based or task-based?

(Multiple Choice)
4.7/5
(34)

Which of the following specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle?

(Multiple Choice)
4.8/5
(38)

What are the two primary access modes of the Bell-LaPadula model and what do they restrict?

(Essay)
5.0/5
(40)

The data access principle that ensures no unnecessary access to data exists byregulating members so they can perform only the minimum data manipulation necessary is known as minimal privilege.____________

(True/False)
4.8/5
(44)

Under what circumstances should access controls be centralized vs.decentralized?

(Essay)
4.9/5
(42)

There are seven access controls methodologies categorized by their inherent characteristics.List and briefly define them.

(Essay)
4.8/5
(33)

Which of the following is NOT a category of access control?

(Multiple Choice)
4.8/5
(40)

According to COSO,internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in what three categories?

(Essay)
4.8/5
(34)

Which of the following is the primary purpose of ISO/IEC 27001:2005?

(Multiple Choice)
4.7/5
(36)

A security​ monitor is a conceptual piece of the system within the trusted computer basethat manages accesscontrols-in other words,it mediates all access to objects by subjects.____________

(True/False)
4.9/5
(32)

Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec,and was created by ISACA and the IT Governance Institute?

(Multiple Choice)
4.7/5
(30)

A TCSEC-defined covert channel,which transmit information by managing the relative timing of events.

(Multiple Choice)
4.7/5
(29)

Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones.

(Multiple Choice)
4.9/5
(36)

A framework or security model customized to anorganization,including implementation details.

(Multiple Choice)
4.8/5
(32)

The information security principle that requires significant tasks to besplit up so that more than one individual is required to complete them is called isolation of duties.____________

(True/False)
4.7/5
(34)

Requires that significant tasks be split up in such a way that more than one individual is responsible for their completion.

(Multiple Choice)
5.0/5
(40)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)