Free CISSP-ISSMP Exam Braindumps (page: 23)

Page 22 of 55

Which of the following access control models uses a predefined set of access privileges for an object of a system?

  1. Role-Based Access Control
  2. Mandatory Access Control
  3. Policy Access Control
  4. Discretionary Access Control

Answer(s): B



Which of the following statements about the availability concept of Information security management is true?

  1. It determines actions and behaviors of a single individual within a system.
  2. It ensures reliable and timely access to resources.
  3. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
  4. It ensures that modifications are not made to data by unauthorized personnel or processes.

Answer(s): B



Which of the following is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems?

  1. IDS
  2. OPSEC
  3. HIDS
  4. NIDS

Answer(s): B



Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

  1. Separation of Duties
  2. Due Care
  3. Acceptable Use
  4. Need to Know

Answer(s): D






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts