Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 1 Question 88 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 88
Topic #: 1
[All CSSLP Questions]

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

Show Suggested Answer Hide Answer
Suggested Answer: B

The Chinese Wall Model is the basic security model developed by Brewer and Nash. This model prevents information flow that may cause a

conflict of interest in an organization representing competing clients. The Chinese Wall Model provides both privacy and integrity for data.

Answer D is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer C is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer A is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military

applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use

security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least

sensitive (e.g., 'Unclassified' or 'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.


Contribute your Thoughts:

Ming
4 days ago
I'm leaning towards the risk management plan as well. That's where we'd expect to find the details on the risk analysis process.
upvoted 0 times
...
Shizue
17 days ago
The risk management plan seems the most obvious choice here. It's designed to manage risks, including quantitative analysis.
upvoted 0 times
Kara
4 days ago
A) Risk analysis plan
upvoted 0 times
...
...
Sheron
18 days ago
I'm not sure, but I think it could also be A) Risk analysis plan, as it specifically focuses on the analysis of risks.
upvoted 0 times
...
Royce
21 days ago
I agree with Catrice, because the risk management plan outlines how risks will be identified, analyzed, and responded to.
upvoted 0 times
...
Catrice
23 days ago
I think the answer is C) Risk management plan.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77