(100%)
SABSA Correct Answer - A holistic lifecycle for developing security
architecture that begins with assessing business requirements and
subsequently creating a 'chain of traceability' through phases of strategy,
concept, design, implementation and metrics is characteristic of which of the
following frameworks?
It represents a simple, long term view of control, it provides a unified vision
for common security controls, it leverages existing technology investments, it
provides a flexible approach to current and future threats and also the needs
of core functions Correct Answer - While an Enterprise Security
Architecture (ESA) can be applied in many different ways, it is focused on a
few key goals. Identify the proper listing of the goals for the ESA:
threat modeling, data classification, and risk assessment Correct Answer -
Which of the following can BEST be used to capture detailed security
requirements?
ISO 27000 Correct Answer - A holistic lifecycle for developing security
architecture that begins with assessing business requirements and
subsequently creating a 'chain of traceability' through phases of strategy,
concept, design, implementation and metrics is characteristic of which of the
following frameworks?
Security policy Correct Answer - Which of the following describes the
rules that need to be implemented to ensure that the security requirements
are met?
Matrix-based Correct Answer - A two-dimensional grouping of
individual subjects into groups or roles and granting access to groups to
objects is an example of which of the following types of models?
Bell-LaPadula Correct Answer - Which of the following models ensures
that a subject with clearance level of 'Secret' has the ability to write only to
, objects classified as 'Secret' or 'Top Secret' but is prevented from writing
information classified as 'Public'?
Invocation property Correct Answer - Which of the following is unique
to the Biba Integrity Model?
Brewer-Nash Correct Answer - Which of the following model is BEST
considered in a shared data-hosting environment so that the data of one
customer is not disclosed to a competitor or other customers sharing that
hosted environment?
Graham-Denning Correct Answer - Which of the following security
models is primarily concerned with how the subjects and objects are created
and how subjects are assigned rights or privileges?
ISO 15408 Correct Answer - Which of the following security standards is
internationally recognized as the standards for sound security practices and is
focused on the standardization and certification of an organization's
Information Security Management System (ISMS)?
Protection profiles Correct Answer - In the Common Criteria, the
common set of functional and assurance requirements for a category of
vendor products deployed in a particular type of environment are known as
EAL 7 Correct Answer - Which of the following evaluation assurance
level that is formally verified, designed and tested is excepted for high risk
situation?
Accreditation Correct Answer - Formal acceptance of an evaluated
system by management is known as
Defined Correct Answer - Which stage of the Capability Maturity Model
(CMM) is characterized by having organizational processes that are proactive?
Threat/risk assessment Correct Answer - Which of the following BEST
provides a method of quantifying risks associated with information
technology when validating the abilities of new security controls and
countermeasures to address the identified risks?