CMGT 430 Wk 1 – Management of Information Security, Ch. 8 Quiz

0 items
CMGT 430 Wk 1 - Management of Information Security, Ch. 8 Quiz
CMGT 430 Wk 1 – Management of Information Security, Ch. 8 Quiz
$6.00
  • Description

CMGT 430 Wk 1 – Management of Information Security, Ch. 8 Quiz

Complete the Ch. 8 Quiz using the MindTap Access link.

Which access control principle limits a user’s access to the specific information required to perform the currently assigned task?

  • Separation of duties
  • Eyes only
  • Least privilege
  • Need-to-know

 

A time-release safe is an example of which type of access control?

  • Nondiscretionary
  • Temporal isolation
  • Content-dependent
  • Constrained user interface

 

In which form of access control is access to a specific set of information contingent on its subject matter?

  • Temporal isolation
  • Content-dependent access controls
  • None of these
  • Constrained user interfaces

 

Which type of access controls can be role-based or task-based?

  • Nondiscretionary
  • Constrained
  • Content-dependent
  • Discretionary

 

Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle?

  • Task-based access controls
  • Security clearances
  • Discretionary access controls
  • Sensitivity levels

 

Under lattice-based access controls, the column of attributes associated with a particular object (such as a printer) is referred to as which of the following?

  • Access control list
  • Capabilities table
  • Access matrix
  • Sensitivity level

 

Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following?

  • Deterrent
  • Preventative
  • Corrective
  • Compensating

 

Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones?

  • Bell-LaPadula
  • Clark-Wilson
  • Common Criteria
  • Biba

 

Which control category discourages an incipient incident?

  • Compensating
  • Preventative
  • Remitting
  • Deterrent

 

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?

  • Need-to-know
  • Separation of duties
  • Least privilege
  • Eyes only