52 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- Matthew is the security administrator for a consulting firm and must enforce access con-
trols that restrict users’ access based upon their previous activity. For example, once a
consultant accesses data belonging to Acme Cola, a consulting client, they may no longer
access data belonging to any of Acme’s competitors. What security model best fits
Matthew’s needs?
A. Clark-Wilson
B. Biba
C. Bell-LaPadula
D. Brewer-Nash - Referring to the figure shown here, what is the earliest stage of a fire where it is possible to
use detection technology to identify it?
Temperature
Time
Stage 1: Incipient
Stage 2: Smoke
Stage 3: Flame
Stage 4: Heat
Image reprinted from CISSP (ISC) 2 Certified Information Systems Security Professional Official Study
Guide, 7th Edition © John Wiley & Sons 2015, reprinted with permission.
A. Incipient
B. Smoke
C. Flame
D. Heat