From a safety configuration viewpoint, the separation of duty concept is not enforced in which of the following?
CISSP - Einde dag 3

Quiz
•
Professional Development
•
Professional Development
•
Hard

Samuel Bergmann
Used 21+ times
FREE Resource
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Mandatory access control policy
Bell-LaPadula access control model
Access control matrix model
Domain type enforcement access control model
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In the Common Criteria, a Protection Profile:
Specifies the mandatory protection in the product to be evaluated.
Is also known as the Target of Evaluation (TOE).
Is also known as the Orange Book.
Specifies the security requirements and protections of the products to be evaluated.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In a ring protection system, where is the security kernel usually located?
Highest ring number
Arbitrarily placed
Lowest ring number
Middle ring number
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
You are a security consultant tasked with reviewing a company’s security model. The current model has the following characteristics:
– It establishes confidentiality such that people cannot read access classified at a higher level than their clearance.
– It forbids users with a specific clearance from writing data to a document with a lower clearance level.
You note that the current model does not account for somebody with a low clearance level from writing data to a document classified at a higher level than their clearance. You need to implement a model to mitigate this. Which of the following security tenets should the new model focus on?
Availability
Governance
Integrity
Confidentiality
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
You are documenting the attempted attacks on your organization’s IT systems. The top type of attack was injection attacks. Which definition should you use to describe an injection attack?
Intercepting and altering network communications
Capturing packets on a network
Providing invalid input
Overloading a system or network
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
You are designing a public key infrastructure for your organization. The organization has issued the following requirements for the PKI:
– Maximize security of the PKI architecture
– Maximize the flexibility of the PKI architecture
You need to choose a PKI design to meet the requirements. Which design should you choose?
A two-tier hierarchy with an offline root CA being in the first tier and issuing CAs in the second tier
A two-tier hierarchy with an online root CA being in the first tier and issuing CAs in the second tier
A three-tier hierarchy with an offline root CA being in the first tier, offline policy CAs being in the second tier, and issuing CAs being in the third tier
A three-tier hierarchy with an offline root CA being in the first tier, online policy CAs being in the second tier, and issuing CAs being in the third tier
Similar Resources on Quizizz
10 questions
KB Scavenger Hunt

Quiz
•
Professional Development
10 questions
MTSS Basics

Quiz
•
Professional Development
10 questions
ADVTT Refreshing Quiz

Quiz
•
Professional Development
10 questions
C&B Team: Blackline Training 101

Quiz
•
Professional Development
10 questions
Lubrication systems review 1

Quiz
•
Professional Development
10 questions
Port and Terminal Operations

Quiz
•
Professional Development
10 questions
Pruebas ACACE-CAS

Quiz
•
Professional Development
10 questions
Quizizz W51

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade