Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Information Security Study Set 1
Exam 8: Security Management Models
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Controls access to a specific set of information based on its content.
Question 22
True/False
The Information Technology Infrastructure Library (ITIL)is a collection of policies and practices for managing the development and operation of IT infrastructures.
Question 23
True/False
The data access principle that ensures no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary is known as minimal privilege.
Question 24
Multiple Choice
Which of the following is the primary purpose of ISO/IEC 27001:2005?
Question 25
Essay
Under what circumstances should access controls be centralized vs.decentralized?
Question 26
Multiple Choice
One of the TCSEC's covert channels,which communicate by modifying a stored object.
Question 27
Short Answer
____________________ channels are unauthorized or unintended methods of communications hidden inside a computer system,and include storage and timing channels.
Question 28
Multiple Choice
Which control category discourages an incipient incident?
Question 29
Short Answer
In the COSO framework,___________ activities include those policies and procedures that support management directives.
Question 30
Multiple Choice
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?
Question 31
Essay
When copies of classified information are no longer valuable or too many copies exist,what steps should be taken to destroy them properly? Why?
Question 32
Multiple Choice
Which of the following is NOT a category of access control?
Question 33
True/False
A person's security clearance is a personnel security structure in which each user of an information asset is assigned an authorization level that identifies the level of classified information he or she is cleared to access.