Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 110 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 110
Topic #: 4
[All CSSLP Questions]

Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.

Show Suggested Answer Hide Answer
Suggested Answer: A

The Biba model is a formal state transition system of computer security policy that describes a set of access control rules

designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may

not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.


Contribute your Thoughts:

0/2000 characters
Raina
1 day ago
That's a tough one, I'm going to go with Access Control Policy. Sounds like the right fit!
upvoted 0 times
...
Clay
6 days ago
Access Control Mechanism
upvoted 0 times
...
Anglea
12 days ago
Access Control Policy
upvoted 0 times
...
Quentin
17 days ago
Access Control Model
upvoted 0 times
...
Matthew
22 days ago
I’m leaning towards "access control policy," but I feel like there’s a specific term that fits better here.
upvoted 0 times
...
Tequila
27 days ago
This question seems familiar; I practiced one about state transition systems, but I can't recall the exact term.
upvoted 0 times
...
Beatriz
2 months ago
I remember studying access control models, and I feel like it could also be "Biba model," which focuses on integrity.
upvoted 0 times
...
Laine
2 months ago
I think the answer might be "Bell-LaPadula model," but I'm not entirely sure if that's the right one for data integrity.
upvoted 0 times
...
Tayna
2 months ago
I think I know the answer, but I'm not 100% sure. I'll write down my thoughts and reasoning, then double-check before submitting.
upvoted 0 times
...
Lai
2 months ago
No problem, I've got a good strategy for this. I'll start by listing out the key elements of a formal state transition system, then match that to the description provided in the question.
upvoted 0 times
...
Otis
2 months ago
Wait, I'm a bit confused. Is this asking about a specific security model or a general description of access control policies? I'll need to re-read the question carefully.
upvoted 0 times
...
Stephaine
3 months ago
Okay, I've got this. The answer is definitely "Bell-LaPadula model". It's a classic access control framework for ensuring data integrity.
upvoted 0 times
...
Kimberlie
3 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the key security concepts and how they relate to the question.
upvoted 0 times
...

Save Cancel