Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which security model is specifically designed to protect the integrity of information in a government computing environment?

    1. The Sherwood Applied Business Security Architecture (SABSA)

    2. The Bell-LaPadula model

    3. The Biba model

    4. The Zachman Framework

  2. Which of the following would eliminate the vulnerability that allows the buffer overflow attack?

    1. Monitoring the process state table

    2. Preemptive multitasking

    3. Compiling code instead of interpreting code into machine language

    4. Qualifying the data required ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.