The steps of an access control model should follow whic…
The steps of an access control model should follow which logical flow:
Which of the following statements pertaining to access …
Which of the following statements pertaining to access control is FALSE?
Which access control model achieves data integrity thro…
Which access control model achieves data integrity through well-formed transactions and separation of duties?
Which access control model was proposed for enforcing a…
Which access control model was proposed for enforcing access control in government and military
applications?
Which of the following access control techniques BEST g…
Which of the following access control techniques BEST gives the security officers the ability to specify and
enforce enterprise-specific security policies in a way that maps naturally to an organization’s structure?
Which of the following are additional access control ob…
Which of the following are additional access control objectives?
In an organization where there are frequent personnel c…
In an organization where there are frequent personnel changes, non-discretionary access control using Role
Based Access Control (RBAC) is useful because:
The access controls may be based on:
In non-discretionary access control using Role Based Access Control (RBAC), a central authority determines
what subjects can have access to certain objects based on the organizational security policy. The access
controls may be based on:
In the Bell-LaPadula model, the *-property (Star-proper…
In the Bell-LaPadula model, the *-property (Star-property) is also called:
This accountability is accomplished:
Controls provide accountability for individuals who are accessing sensitive information. This accountability is
accomplished: