Filters
Question type

Study Flashcards

Lattice-based access controls use a two-dimensional matrix to assign authorizations,what are the two dimensions and what are they called?

Correct Answer

verifed

verified

Lattice-based access control specifies t...

View Answer

Under the Clark-Wilson model,internal consistency means that the system is consistent with similar data in the outside world.

A) True
B) False

Correct Answer

verifed

verified

Under lattice-based access controls,the column of attributes associated with a particular object (such as a printer) is referred to as which of the following? 


A)  access control list
B)  capabilities table 
C)  access matrix
D)  sensitivity level

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A

A security blueprint is the outline of the more thorough security framework.

A) True
B) False

Correct Answer

verifed

verified

A form of nondiscretionary control where access is determined based on the tasks assigned to a specified user.


A)  Blueprint
B)  DAC
C)  content-dependent access controls
D)  rule-based access controls
E)  separation of duties
F)  sensitivity levels
G)  storage channels
H)  task-based controls
I)  timing channels
J) TCB

K) F) and G)
L) E) and J)

Correct Answer

verifed

verified

A framework or security model customized to an organization,including implementation details.


A)  Blueprint
B)  DAC
C)  content-dependent access controls
D)  rule-based access controls
E)  separation of duties
F)  sensitivity levels
G)  storage channels
H)  task-based controls
I)  timing channels
J) TCB

K) None of the above
L) I) and J)

Correct Answer

verifed

verified

Which of the following specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle? 


A)  Discretionary access controls
B)  Task-based access controls 
C)  Security clearances
D)  Sensitivity levels

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

In information security,a framework or security model customized to an organization,including implementation details is known as a floorplan.

A) True
B) False

Correct Answer

verifed

verified

Which piece of the Trusted Computing Base's security system manages access controls? 


A)  trusted computing base
B)  reference monitor 
C)  covert channel
D)  verification module

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

​Dumpster delving is an information attack that involves searching through a target organization's trash and recycling bins for sensitive information.

A) True
B) False

Correct Answer

verifed

verified

What is the data classification for information deemed to be National Security Information for the U.S.military as specified in 2009 in Executive Order 13526?

Correct Answer

verifed

verified

​For most information,the U.S.military uses a three-level classification scheme for information deemed to be National Security Information (NSI),as defined in Executive Order 12958 in 1995 and Executive Order 13526 in 2009.Here are the classifications along with descriptions from the document: Sec.1.2.Classification Levels. (a)Information may be classified at one of the following three levels: 1)"Top Secret" shall be applied to information,the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe. 2)"Secret" shall be applied to information,the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe. 3)"Confidential" shall be applied to information,the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe. ​

Information Technology Infrastructure Library provides guidance in the development and implementation of an organizational InfoSec governance structure.

A) True
B) False

Correct Answer

verifed

verified

Access is granted based on a set of rules specified by the central authority.


A)  Blueprint
B)  DAC
C)  content-dependent access controls
D)  rule-based access controls
E)  separation of duties
F)  sensitivity levels
G)  storage channels
H)  task-based controls
I)  timing channels
J) TCB

K) D) and J)
L) B) and G)

Correct Answer

verifed

verified

D

Access controls are build on three key principles. List and briefly define them.

Correct Answer

verifed

verified

Least privilege: The principle by which ...

View Answer

Which security architecture model is part of a larger series of standards collectively referred to as the "Rainbow Series"? 


A)  Bell-LaPadula
B)  TCSEC 
C)  ITSEC
D)  Common Criteria

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following? 


A)  preventative
B)  deterrent 
C)  corrective
D)  compensating

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A time-release safe is an example of which type of access control? 


A)  content-dependent
B)  constrained user interface 
C)  temporal isolation
D)  nondiscretionary

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The principle of limiting users' access privileges to the specific information required to perform their assigned tasks is known as need-to-know.

A) True
B) False

Correct Answer

verifed

verified

According to COSO,internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in what three categories?

Correct Answer

verifed

verified

Effectiveness and efficiency o...

View Answer

A TCSEC-defined covert channel,which transmit information by managing the relative timing of events.


A)  Blueprint
B)  DAC
C)  content-dependent access controls
D)  rule-based access controls
E)  separation of duties
F)  sensitivity levels
G)  storage channels
H)  task-based controls
I)  timing channels
J) TCB

K) C) and J)
L) B) and G)

Correct Answer

verifed

verified

Showing 1 - 20 of 60

Related Exams

Show Answer