Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSSLP Exam Guide with 100% Complete Solutions

Beoordeling
-
Verkocht
-
Pagina's
75
Cijfer
A+
Geüpload op
30-05-2024
Geschreven in
2023/2024

CSSLP Exam Guide with 100% Complete Solutions Which access control mechanism provides the owner of an object the opportunity to determine the access control permissions for other subjects? a. Mandatory b. Role-based c. Discretionary d. Token-based - Correct Answer ️️ -Discretionary The elements UDI and CDI are associated with which access control model? a. Mandatory access control b. Clark-Wilson c. Biba integrity d. Bell-LaPadula confidentiality - Correct Answer ️️ -Clark-Wilson The concept of separating elements of a system to prevent inadvertent information sharing is? a. Leverage existing components b. separation of duties c. weakest link d. least common mechanism - Correct Answer ️️ -Least Common Mechanism Which of the following is true about the Biba Integrity Model? a. No write up, no read down b. No read up, no write down c. It is described by the simple security rule d. It uses the high-water-mark principle - Correct Answer ️️ -No write up, no read down The concept of preventing a subject from denying a previous action with an object in a system is a description of? a. Simple security rule b. Non-repudiation c. Defense in depth d. Constrained data item (CDI) - Correct Answer ️️ -Non-repudiation What was described as being essential in order to implement discretionary access controls? a. Object owner-defined security access b. Certificates c. Labels d. Security classifications - Correct Answer ️️ -Object owner-defined security access The CIA of security includes: a. Confidentiality, integrity, authentication b. Certificates, integrity, availability c. Confidentiality, inspection, authentication d. Confidentiality, integrity, availability - Correct Answer ️️ -Confidentiality, integrity, availability Complete mediation is an approach to security that includes: a. Protect systems and networks by using defense in depth b. A security design that cannot be bypassed or circumvented c. The use of interlocking rings of trust to ensure protection to data elements d. The use of access control lists to enforce security rules - Correct Answer ️️ -A security design that cannot be bypassed or circumvented (Complete Mediation) The fundamental approach to security in which an object has only the necessary rights and privilege to perform its task with no additional permissions is a description of: a. Layered security b. Least privilege c. Role-based security d. Clark-Wilson model - Correct Answer ️️ -Least Privilege Which access control technique relies on a set of rules to determine whether access to an object will be granted or not? a. role-based access control b. Object and rule instantiate access control c. Rule-based access control d. Discretionary access control - Correct Answer ️️ -Rule-based access control The security principle that ensures that no critical function can be executed by any single individual (by dividing the function into multiple tasks that can't all be executed by the same individual) is know as: a. Discretionary access control b. Security through obscurity c. Separation of duties d. Implicit deny - Correct Answer ️️ -Separation of duties The ability of a subject to interact with an object describes: a. authentication b. Access c. Confidentiality d. Mutual authentication - Correct Answer ️️ -Access Open design places the focus of security efforts on: a. Open-source software components b. Hiding key elements (security through obscurity) c. Proprietary algorithms d. Producing a security mechanism in which its strength is independent of its design - Correct Answer ️️ -Producing a security mechanism in which its strength is independent of its design The security principle of fail-safe is related to: a. Session management b. Exception management c. Least privilege d. Single point of failure - Correct Answer ️️ -Exception management Using the principle of keeping things simple is related to: a. Layered security b. simple Security Rule c. Economy of mechanism d. Implementing least privilege for access control - Correct Answer ️️ -Economy of mechanism Of the following, which is not a class of controls

Meer zien Lees minder
Instelling
CSSLP
Vak
CSSLP











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CSSLP
Vak
CSSLP

Documentinformatie

Geüpload op
30 mei 2024
Aantal pagina's
75
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
KatelynWhitman West Virginia University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1146
Lid sinds
2 jaar
Aantal volgers
483
Documenten
37071
Laatst verkocht
1 dag geleden
Golden Quill Emporium Store

Get Yourself Well-Researched Study Materials to Ace Your Online& Actual Exam Tests with Confidence. STUDY LIKE A PRO WITH A WELL FORMATTED Q&A MATERIALS.

3.6

248 beoordelingen

5
101
4
40
3
54
2
20
1
33

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen