CompTIA Security+ Exam Prep - Question List

Select how would you like to study

126. What type of security model separates data into one subset that needs to be highly protected and another subset that does not require a high level of protection?
  1. GUI Model
  2. The Clark-Wilson Model
  3. Bella-LaPadula Model
  4. Biba Model
127. What security model was created to provide access controls that can change dynamically depending upon a user’s previous actions and is known as the Chinese Wall model?
  1. Brewer and Nash Model
  2. The Clark-Wilson Model
  3. Bella-LaPadula Model
  4. Biba Model
128. In Paul’s office, everyone has access to a computer that only holds secret data. What type of security mode does this office use?
  1. System High-Security Mode
  2. Dedicated Security Mode
  3. Multilevel Security Mode
  4. All of the above.
129. In Peggy’s office, all users have a security clearance to access information, but don’t necessarily need to know all the information processed on the system. Why type of security mode is this?
  1. System High-Security Mode
  2. Dedicated Security Mode
  3. Multilevel Security Mode
  4. All of the above
130. Nathan worked for the U.S. Department of Defense when they developed the Trusted Computer System Evaluation Criteria (TCSEC). What is this book known as?
  1. The Blue Book
  2. The Yellow Book
  3. The Orange Book
  4. The Green Book

Select how would you like to study