Exam 8: Security Management Models

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Controls access to a specific set of information based on its content.

(Multiple Choice)
4.9/5
(35)

​The Information Technology Infrastructure Library (ITIL)is a collection of policies and practices for managing the development and operation of IT infrastructures.

(True/False)
4.8/5
(37)

The data access principle that ensures no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary is known as minimal privilege.

(True/False)
4.8/5
(42)

Which of the following is the primary purpose of ISO/IEC 27001:2005? 

(Multiple Choice)
4.9/5
(38)

Under what circumstances should access controls be centralized vs.decentralized?

(Essay)
4.9/5
(38)

One of the TCSEC's covert channels,which communicate by modifying a stored object.

(Multiple Choice)
4.8/5
(33)

____________________ channels are unauthorized or unintended methods of communications hidden inside a computer system,and include storage and timing channels.

(Short Answer)
4.8/5
(33)

Which control category discourages an incipient incident? 

(Multiple Choice)
4.8/5
(43)

In the COSO framework,___________ activities include those policies and procedures that support management directives.

(Short Answer)
4.8/5
(36)

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary? 

(Multiple Choice)
4.8/5
(41)

When copies of classified information are no longer valuable or too many copies exist,what steps should be taken to destroy them properly? Why?

(Essay)
4.7/5
(38)

Which of the following is NOT a category of access control? 

(Multiple Choice)
4.7/5
(31)

​A person's security clearance is a personnel security structure in which each user of an information asset is assigned an authorization level that identifies the level of classified information he or she is cleared to access.

(True/False)
5.0/5
(41)

What are the five principles that are focused on the governance and management of IT as specified by COBIT 5?

(Essay)
4.9/5
(44)

There are seven access controls methodologies categorized by their inherent characteristics. List and briefly define them.

(Essay)
4.8/5
(40)

The ____________________ principle is based on the requirement that people are not allowed to view data simply because it falls within their level of clearance.

(Short Answer)
4.8/5
(35)

In which form of access control is access to a specific set of information contingent on its subject matter? 

(Multiple Choice)
4.8/5
(35)

The COSO framework is built on five interrelated components.Which of the following is NOT one of them? 

(Multiple Choice)
5.0/5
(36)

Which type of access controls can be role-based or task-based? 

(Multiple Choice)
4.8/5
(34)

Which access control principle limits a user's access to the specific information required to perform the currently assigned task? 

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)