Chapter review
Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.
Which security model is specifically designed to protect the integrity of information in a government computing environment?
The Sherwood Applied Business Security Architecture (SABSA)
The Bell-LaPadula model
The Biba model
The Zachman Framework
Which of the following would eliminate the vulnerability that allows the buffer overflow attack?
Monitoring the process state table
Preemptive multitasking
Compiling code instead of interpreting code into machine language
Qualifying the data required ...
Get CISSP Training Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.