New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 110 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 110
Topic #: 4
[All CSSLP Questions]

Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.

Show Suggested Answer Hide Answer
Suggested Answer: A

The Biba model is a formal state transition system of computer security policy that describes a set of access control rules

designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may

not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.


Contribute your Thoughts:

0/2000 characters
Beatriz
5 days ago
I remember studying access control models, and I feel like it could also be "Biba model," which focuses on integrity.
upvoted 0 times
...
Laine
10 days ago
I think the answer might be "Bell-LaPadula model," but I'm not entirely sure if that's the right one for data integrity.
upvoted 0 times
...
Tayna
15 days ago
I think I know the answer, but I'm not 100% sure. I'll write down my thoughts and reasoning, then double-check before submitting.
upvoted 0 times
...
Lai
20 days ago
No problem, I've got a good strategy for this. I'll start by listing out the key elements of a formal state transition system, then match that to the description provided in the question.
upvoted 0 times
...
Otis
26 days ago
Wait, I'm a bit confused. Is this asking about a specific security model or a general description of access control policies? I'll need to re-read the question carefully.
upvoted 0 times
...
Stephaine
1 month ago
Okay, I've got this. The answer is definitely "Bell-LaPadula model". It's a classic access control framework for ensuring data integrity.
upvoted 0 times
...
Kimberlie
1 month ago
Hmm, this seems like a tricky one. I'll need to think carefully about the key security concepts and how they relate to the question.
upvoted 0 times
...

Save Cancel