CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

52 Chapter 3 ■ Security Architecture and Engineering (Domain 3)



  1. Matthew is the security administrator for a consulting firm and must enforce access con-
    trols that restrict users’ access based upon their previous activity. For example, once a
    consultant accesses data belonging to Acme Cola, a consulting client, they may no longer
    access data belonging to any of Acme’s competitors. What security model best fits
    Matthew’s needs?
    A. Clark-Wilson
    B. Biba
    C. Bell-LaPadula
    D. Brewer-Nash

  2. Referring to the figure shown here, what is the earliest stage of a fire where it is possible to
    use detection technology to identify it?


Temperature

Time
Stage 1: Incipient

Stage 2: Smoke
Stage 3: Flame

Stage 4: Heat

Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.

A. Incipient
B. Smoke
C. Flame
D. Heat
Free download pdf