Podcast
Questions and Answers
Uses an access matrix of subject and labeled objects. ___________ MODEL 11.
Uses an access matrix of subject and labeled objects. ___________ MODEL 11.
BELLLAPADULA
This model is to secure the confidentiality of data with respect to different levels of secrecy. ___________ MODEL 10.
This model is to secure the confidentiality of data with respect to different levels of secrecy. ___________ MODEL 10.
BELLLAPADULA
Secret can't request from top secret use. ___________ PROPERTY 12.
Secret can't request from top secret use. ___________ PROPERTY 12.
INVOCATION
A process wherein the user needs to fully verify the data they requested before they get access to it. INTEGRATION VERIFICATION ___________ 15.
A process wherein the user needs to fully verify the data they requested before they get access to it. INTEGRATION VERIFICATION ___________ 15.
Signup and view all the answers
The law that outlines important measures the government should take to protect its own systems from various assaults. COMPUTER ___________ ACT 20.
The law that outlines important measures the government should take to protect its own systems from various assaults. COMPUTER ___________ ACT 20.
Signup and view all the answers
They offer a structure for defending against online dangers including illegal access and data breaches. ___________ STANDARDS 22.
They offer a structure for defending against online dangers including illegal access and data breaches. ___________ STANDARDS 22.
Signup and view all the answers
It includes physical approaches in addition to digital ones for data protection. INFORMATION ______
It includes physical approaches in addition to digital ones for data protection. INFORMATION ______
Signup and view all the answers
One of the importance aspects of INFORMATION ______ is to prevent cyber-attacks by utilizing firewalls and other deterrents.
One of the importance aspects of INFORMATION ______ is to prevent cyber-attacks by utilizing firewalls and other deterrents.
Signup and view all the answers
It involves measures to maintain data accessible despite system errors and intervention from outside sources. ______
It involves measures to maintain data accessible despite system errors and intervention from outside sources. ______
Signup and view all the answers
It ensures that system information is not given to unauthorized access and is only read and understood by people with the appropriate authorizations. ______
It ensures that system information is not given to unauthorized access and is only read and understood by people with the appropriate authorizations. ______
Signup and view all the answers
This group is in charge of making sure that the concerns of stakeholders are addressed and has representation from across the institution. STEERING ______
This group is in charge of making sure that the concerns of stakeholders are addressed and has representation from across the institution. STEERING ______
Signup and view all the answers
This group develops strategies and ensures integration with and cooperation of business unit managers and process owners. ______
This group develops strategies and ensures integration with and cooperation of business unit managers and process owners. ______
Signup and view all the answers
This level of data includes internal information like operating while essential to an organization, ______.
This level of data includes internal information like operating while essential to an organization, ______.
Signup and view all the answers
Standard that is Developed by the ______ Institute of Standards and Technology (NIST).
Standard that is Developed by the ______ Institute of Standards and Technology (NIST).
Signup and view all the answers
It also hides your IP address, allowing you to browse the web anonymously and ______.
It also hides your IP address, allowing you to browse the web anonymously and ______.
Signup and view all the answers
It also helps to ensure that data is compliant with applicable laws and ______.
It also helps to ensure that data is compliant with applicable laws and ______.
Signup and view all the answers
This act covers computer crimes that are perpetrated in international trade and ______.
This act covers computer crimes that are perpetrated in international trade and ______.
Signup and view all the answers
It's the knowledge of right and wrong, and the ability to adhere to ______ principles while on the job.
It's the knowledge of right and wrong, and the ability to adhere to ______ principles while on the job.
Signup and view all the answers
The following are the capabilities of BIBA Security model in keeping the information safe. EXCEPT a.Access can grant easily regardless the level of access control b.Ensure data integrity c.Authentication prevents unauthorized users.d.Has it’s invocation property when it comes to request service 34.Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.CIA b.ISO c.DLP d.GDRP RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture 35.Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.Information Handling b.Data Asset c.Data Hiding d.Information Asset 36.It represents all the information that is available to most of the employees, but not to all of them. a.Restricted Information b.Limited Information c.Classified Data d.Constrained Data 37.The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.Third-Party Security d.Information Restrictions 38.It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.Authorized Recipients Data b.Data Access Control c.Data Distribution d.Clear Marking 39.is a process to decide what information should be classified as what and how, and how it should be managed. a.______ b.
The following are the capabilities of BIBA Security model in keeping the information safe. EXCEPT a.Access can grant easily regardless the level of access control b.Ensure data integrity c.Authentication prevents unauthorized users.d.Has it’s invocation property when it comes to request service 34.Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.CIA b.ISO c.DLP d.GDRP RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture 35.Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.Information Handling b.Data Asset c.Data Hiding d.Information Asset 36.It represents all the information that is available to most of the employees, but not to all of them. a.Restricted Information b.Limited Information c.Classified Data d.Constrained Data 37.The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.Third-Party Security d.Information Restrictions 38.It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.Authorized Recipients Data b.Data Access Control c.Data Distribution d.Clear Marking 39.is a process to decide what information should be classified as what and how, and how it should be managed. a.______ b.
Signup and view all the answers
Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.______ b.ISO c.DLP d.GDRP
Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.______ b.ISO c.DLP d.GDRP
Signup and view all the answers
Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.______ b.Data Asset c.Data Hiding d.Information Asset
Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.______ b.Data Asset c.Data Hiding d.Information Asset
Signup and view all the answers
It represents all the information that is available to most of the employees, but not to all of them. a.______ b.Limited Information c.Classified Data d.Constrained Data
It represents all the information that is available to most of the employees, but not to all of them. a.______ b.Limited Information c.Classified Data d.Constrained Data
Signup and view all the answers
The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.______ d.Information Restrictions
The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.______ d.Information Restrictions
Signup and view all the answers
It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.______ b.Data Access Control c.Data Distribution d.Clear Marking
It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.______ b.Data Access Control c.Data Distribution d.Clear Marking
Signup and view all the answers
Information Classification c.Information Asset Classification d.Data Classification 40.It is the person who is in charge of, accountable for, and interested in the gathering, integrity, and accessibility of information.a.Data Owner b.System Owner c.Data Custodian d.Security Administrator RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture TRUE OR FALSE: Read and analyze the following statement and write T if it’s true otherwise F if false in the space provided. 41.The main objective of BIBA Security model is the confidentiality of all the information or data in the system.FALSE 42.Design a system that is resilient to denial of service attacks and usage spikes.TRUE 43.Star Confidentiality Rule states that the user can only Read the files on the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer of Secrecy, due to which we call this rule as NO WRITE-DOWN.FALSE 44.Graham–Denning is primarily concerned with how a model system controls subjects and objects at a very basic level where other models simply assumed such control.TRUE 45.In Bell-Lapadula systems are divided into User and labeled Data.TRUE 46.Information assurance investments are intended to support organizational objectives.FALSE 47.One of the effective governance in security is Establishing the proper institutional structure and segregation of duties.FALSE 48.
Information Classification c.Information Asset Classification d.Data Classification 40.It is the person who is in charge of, accountable for, and interested in the gathering, integrity, and accessibility of information.a.Data Owner b.System Owner c.Data Custodian d.Security Administrator RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture TRUE OR FALSE: Read and analyze the following statement and write T if it’s true otherwise F if false in the space provided. 41.The main objective of BIBA Security model is the confidentiality of all the information or data in the system.FALSE 42.Design a system that is resilient to denial of service attacks and usage spikes.TRUE 43.Star Confidentiality Rule states that the user can only Read the files on the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer of Secrecy, due to which we call this rule as NO WRITE-DOWN.FALSE 44.Graham–Denning is primarily concerned with how a model system controls subjects and objects at a very basic level where other models simply assumed such control.TRUE 45.In Bell-Lapadula systems are divided into User and labeled Data.TRUE 46.Information assurance investments are intended to support organizational objectives.FALSE 47.One of the effective governance in security is Establishing the proper institutional structure and segregation of duties.FALSE 48.
Signup and view all the answers