Under the Common Criteria, ____ is theuser-generated specifications for securityrequirements.Select one:a. Protection Profile [PP]b. Security Functional Requirements[SFRs]c. Security Target [ST]d. Target of Evaluation [ToE]
Under the TCSEC model, the term ____refers to the rules of configuration for asystem, rather than a managerial guidancedocument.Study Guide: Chapter 65 of 73/3/2015 10:25 AM
Get answer to your question and much more
1.00Flag questiondocument.Select one:
Get answer to your question and much more
Question17CorrectWhich of the following is NOT a changecontrol principle of the Clark-Wilson model?Select one:Mark 1.00 out of1.00Flag question
Get answer to your question and much more
Question18CorrectWhich of the following is not an element ofthe Clark-Wilson model?Select one:Mark 1.00 out of1.00Flag questiona. Internal consistency validation itemsb. Unconstrained data itemsc. Integrity verification proceduresd. Constrained data items
Question19Correct____ access controls are determined by acentral authority and can be based on rolesor tasks.Mark 1.00 out of1.00Flag questionSelect one:Study Guide: Chapter 66 of 73/3/2015 10:25 AM
Get answer to your question and much more
1.00Flag questionSelect one:
Get answer to your question and much more
Question20Correct____ helps organizations comply withcritical regulations like the Sarbanes-OxleyAct of 2002.Select one:Mark 1.00 out of1.00Flag question
Get answer to your question and much more
Question21CorrectMark 1.00 out of1.00Flag question____ is an IT governance framework andsupporting toolset that allows managers tobridge the gap between controlrequirements, technical issues, andbusiness risks. It enables clear policydevelopment and good practice for ITcontrol throughout organizations.Select one:a. ISOb. NISTc. COSOd. COBITStudy Guide: Chapter 6
QuestionCorrectMark 1.00 out of1.00Flag questionCollecting project metrics may be evenmore challenging. Unless the organizationis satisfied with a simple tally of who spenthow many hours doing which tasks, itneeds some mechanism to link the ____ ofeach project, in terms of loss control or riskreduction, to the resources consumed.Select one:1
Get answer to your question and much more
QuestionCorrectMark 1.00 out of1.00Flag question2QuestionCorrectMark 1.00 out of1.00Flag question3
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 28 pages?
Upload your study docs or become a
Course Hero member to access this document
Tags
Flag question, Security guard