Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.
Which security model is specifically designed to protect the integrity of information in a government computing environment?
The Sherwood Applied Business Security Architecture (SABSA)
The Bell-LaPadula model
The Biba model
The Zachman Framework
Which of the following would eliminate the vulnerability that allows the buffer overflow attack?
Monitoring the process state table
Compiling code instead of interpreting code into machine language
Qualifying the data required ...