New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 1 Question 37 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 37
Topic #: 1
[All CSSLP Questions]

Which of the following security models focuses on data confidentiality and controlled access to classified information?

Show Suggested Answer Hide Answer
Suggested Answer: D

The Bell-La Padula Model is a state machine model used for enforcing access control in government and military applications. The model is a

formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and

clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least sensitive (e.g., 'Unclassified' or

'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.

Answer B is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer A is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer C is incorrect. The take-grant protection model is a formal model used in the field of computer security to establish or disprove

the safety of a given computer system that follows specific rules. It shows that for specific systems the question of safety is decidable in linear

time, which is in general undecidable.

The model represents a system as directed graph, where vertices are either subjects or objects. The edges between them are labeled and

the label indicates the rights that the source of the edge has over the destination. Two rights occur in every instance of the model: take and

grant. They play a special role in the graph rewriting rules describing admissible changes of the graph.


Contribute your Thoughts:

0/2000 characters
Earleen
4 months ago
Really? I always thought it was the Take-Grant model!
upvoted 0 times
...
Orville
4 months ago
I thought the Clark-Wilson model was more about integrity?
upvoted 0 times
...
Laila
4 months ago
Wait, isn’t the Biba model also about access control?
upvoted 0 times
...
Talia
4 months ago
Agreed, it’s all about confidentiality.
upvoted 0 times
...
Dallas
5 months ago
It's definitely the Bell-La Padula model!
upvoted 0 times
...
Dalene
5 months ago
I feel like the Take-Grant model is more about access control, but I can't recall its specifics.
upvoted 0 times
...
Nan
5 months ago
The Clark-Wilson model deals with integrity as well, so it can't be the answer.
upvoted 0 times
...
Alease
5 months ago
I think the Bell-La Padula model is the one that focuses on data confidentiality, but I'm not completely sure.
upvoted 0 times
...
Melinda
5 months ago
I remember studying the Biba model, but that one is more about integrity, right?
upvoted 0 times
...
Ardella
5 months ago
I think this is a pretty straightforward question. The general accounts receivable setup program is likely found in the Accounts Receivable module, so I'll focus on options B and D.
upvoted 0 times
...
Ashley
5 months ago
I keep mixing up fixed and incremental budgets. I think fixed budgets are more rigid, so they don't fit with cash budgets?
upvoted 0 times
...
Glennis
5 months ago
Wait, does option D sound plausible? Late hours and fatigue could increase risk... but I'm not entirely certain.
upvoted 0 times
...
Zita
5 months ago
The part about only one matching row being used from the lookup table is interesting. I'll make sure I have that right.
upvoted 0 times
...

Save Cancel