Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 9 Question 96 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 96
Topic #: 9
[All CSSLP Questions]

You work as an analyst for Tech Perfect Inc. You want to prevent information flow that may cause a conflict of interest in your organization representing competing clients. Which of the following security models will you use?

Show Suggested Answer Hide Answer
Suggested Answer: B

The Chinese Wall Model is the basic security model developed by Brewer and Nash. This model prevents information flow that may cause a

conflict of interest in an organization representing competing clients. The Chinese Wall Model provides both privacy and integrity for data.

Answer D is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer C is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer A is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military

applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use

security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least

sensitive (e.g., 'Unclassified' or 'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.


Contribute your Thoughts:

Gladys
15 days ago
The Biba model? What is this, a pasta dish? I'll stick with the Chinese Wall, it's the most appetizing option on the menu.
upvoted 0 times
...
Brynn
17 days ago
I personally prefer the Clark-Wilson model because it focuses on integrity constraints, which are crucial in preventing information flow that may lead to conflicts.
upvoted 0 times
...
Leatha
20 days ago
I agree with Michel, the Chinese Wall model seems like the best choice to prevent conflicts of interest.
upvoted 0 times
...
Fabiola
20 days ago
The Bell-LaPadula model seems a bit too strict for this scenario. I don't think we need to worry about classified information leaks, just keeping our clients separated.
upvoted 0 times
Jarvis
1 days ago
A) Bell-LaPadula model
upvoted 0 times
...
...
Nichelle
23 days ago
The Chinese Wall model sounds like the perfect solution to prevent conflicts of interest. It's like building a literal wall between competing clients, but without the construction workers and hard hats.
upvoted 0 times
Vicente
6 hours ago
D) Biba model
upvoted 0 times
...
Allene
5 days ago
C) Clark-Wilson model
upvoted 0 times
...
Destiny
12 days ago
B) Chinese Wall model
upvoted 0 times
...
Jeannetta
13 days ago
A) Bell-LaPadula model
upvoted 0 times
...
...
Michel
26 days ago
I think I would use the Chinese Wall model.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77