Which of the following is not a change control principle of the clark-wilson model?

Under the Common Criteria, ____ is theuser-generated specifications for securityrequirements.Select one:a. Protection Profile [PP]b. Security Functional Requirements[SFRs]c. Security Target [ST]d. Target of Evaluation [ToE]

Under the TCSEC model, the term ____refers to the rules of configuration for asystem, rather than a managerial guidancedocument.Study Guide: Chapter 65 of 73/3/2015 10:25 AM

Get answer to your question and much more

1.00Flag questiondocument.Select one:

Get answer to your question and much more

Question17CorrectWhich of the following is NOT a changecontrol principle of the Clark-Wilson model?Select one:Mark 1.00 out of1.00Flag question

Get answer to your question and much more

Question18CorrectWhich of the following is not an element ofthe Clark-Wilson model?Select one:Mark 1.00 out of1.00Flag questiona. Internal consistency validation itemsb. Unconstrained data itemsc. Integrity verification proceduresd. Constrained data items

Question19Correct____ access controls are determined by acentral authority and can be based on rolesor tasks.Mark 1.00 out of1.00Flag questionSelect one:Study Guide: Chapter 66 of 73/3/2015 10:25 AM

Get answer to your question and much more

1.00Flag questionSelect one:

Get answer to your question and much more

Question20Correct____ helps organizations comply withcritical regulations like the Sarbanes-OxleyAct of 2002.Select one:Mark 1.00 out of1.00Flag question

Get answer to your question and much more

Question21CorrectMark 1.00 out of1.00Flag question____ is an IT governance framework andsupporting toolset that allows managers tobridge the gap between controlrequirements, technical issues, andbusiness risks. It enables clear policydevelopment and good practice for ITcontrol throughout organizations.Select one:a. ISOb. NISTc. COSOd. COBITStudy Guide: Chapter 6

QuestionCorrectMark 1.00 out of1.00Flag questionCollecting project metrics may be evenmore challenging. Unless the organizationis satisfied with a simple tally of who spenthow many hours doing which tasks, itneeds some mechanism to link the ____ ofeach project, in terms of loss control or riskreduction, to the resources consumed.Select one:1

Get answer to your question and much more

QuestionCorrectMark 1.00 out of1.00Flag question2QuestionCorrectMark 1.00 out of1.00Flag question3

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 28 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Flag question, Security guard

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data man?

The principle of least privilege addresses access control and states that an individual should have only the minimum access privileges necessary to perform a specific job or task and nothing more.

Which piece of the Trusted Computing Base's security system manages access controls quizlet?

[T/F] A security monitor is a conceptual piece of system within the trusted computer base that manages access controls-in other words, it mediates all access to objects by subjects.

Which security architecture model is part of a larger series of standards collectively referred to as the Rainbow Series?

Which security architecture model is part of a larger series of standards collectively referred to as the "Rainbow Series"? COBIT.

What is required of the separation of duties principle quizlet?

Separation of duties is the prevention of conflict of interest, wrongful acts, fraud, abuse, and errors. Also, it is the detection of control failures that include security breaches, information theft, and circumvention of security controls.

Chủ Đề