Exam 8: Security Management Models
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The information security principle that requires significant tasks to be split up so that more than one individual is required to complete them is called isolation of duties.
(True/False)
4.9/5
(41)
Which of the following is a generic blueprint offered by a service organization which must be flexible,scalable,robust,and detailed?
(Multiple Choice)
4.8/5
(33)
ISO/IEC 27001 provides implementation details on how to implement ISO/IEC 27002 and how to set up a(n)____________________.
(Essay)
4.8/5
(41)
One approach used to categorize access control methodologies categorizes controls based on their operational impact on the organization. What are these categories as described by NIST?
(Essay)
4.7/5
(41)
A security monitor is a conceptual piece of the system within the trusted computer base that manages access controls-in other words,it mediates all access to objects by subjects.
(True/False)
4.7/5
(40)
In a lattice-based access control,a restriction table is the row of attributes associated with a particular subject (such as a user).
(True/False)
4.8/5
(30)
Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones.
(Multiple Choice)
4.8/5
(49)
Controls implemented at the discretion or option of the data user.
(Multiple Choice)
4.9/5
(41)
Ratings of the security level for a specified collection of information (or user)within a mandatory access control scheme.
(Multiple Choice)
4.8/5
(37)
Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec,and was created by ISACA and the IT Governance Institute?
(Multiple Choice)
4.7/5
(36)
Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.
(True/False)
4.8/5
(32)
To design a security program,an organization can use a(n)____________________,which is a generic outline of the more thorough and organization-specific blueprint offered by a service organization.
(Short Answer)
4.7/5
(39)
What are the two primary access modes of the Bell-LaPadula model and what do they restrict?
(Essay)
4.9/5
(30)
Under the Common Criteria,which term describes the user-generated specifications for security requirements?
(Multiple Choice)
4.9/5
(25)
Requires that significant tasks be split up in such a way that more than one individual is responsible for their completion.
(Multiple Choice)
4.7/5
(44)
In information security,a specification of a model to be followed during the design, selection,and initial and ongoing implementation of all subsequent security controls is known as a blueprint.
(True/False)
4.8/5
(39)
Within TCSEC,the combination of all hardware,firmware,and software responsible for enforcing the security policy.
(Multiple Choice)
4.9/5
(38)
Which of the following is NOT one of the three levels in the U.S.military data classification scheme for National Security Information?
(Multiple Choice)
4.8/5
(29)
Which of the following is NOT a change control principle of the Clark-Wilson model?
(Multiple Choice)
4.9/5
(31)
Lattice-based access control specifies the level of access each subject has to each object,if any.
(True/False)
4.8/5
(30)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)