O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which security model is specifically designed to protect the integrity of information in a government computing environment?

    1. The Sherwood Applied Business Security Architecture (SABSA)

    2. The Bell-LaPadula model

    3. The Biba model

    4. The Zachman Framework

  2. Which of the following would eliminate the vulnerability that allows the buffer overflow attack?

    1. Monitoring the process state table

    2. Preemptive multitasking

    3. Compiling code instead of interpreting code into machine language

    4. Qualifying the data required ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required