Free ISSMP Exam Braindumps (page: 6)

Page 5 of 56

Which of the following security models dictates that subjects can only access objects through applications?

  1. Biba-Clark model
  2. Bell-LaPadula
  3. Clark-Wilson
  4. Biba model

Answer(s): C



Which of the following relies on a physical characteristic of the user to verify his identity?

  1. Social Engineering
  2. Kerberos v5
  3. Biometrics
  4. CHAP

Answer(s): C



Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

  1. Data downloading from the Internet
  2. File and object access
  3. Network logons and logoffs
  4. Printer access

Answer(s): B,C,D



You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly.
What type of security audit do you need to conduct to resolve the problem?

  1. Operational audit
  2. Dependent audit
  3. Non-operational audit
  4. Independent audit

Answer(s): D






Post your Comments and Discuss ISC2 ISSMP exam with other Community members:

ISSMP Discussions & Posts