Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which security model is specifically designed to protect the integrity of information in a government computing environment?

    1. The Sherwood Applied Business Security Architecture (SABSA)

    2. The Bell-LaPadula model

    3. The Biba model

    4. The Zachman Framework

  2. Which of the following would eliminate the vulnerability that allows the buffer overflow attack?

    1. Monitoring the process state table

    2. Preemptive multitasking

    3. Compiling code instead of interpreting code into machine language

    4. Qualifying the data required ...

Get CISSP Training Kit now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.