Page 133 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 133

5.  Which of the following is not true?

                    A.  Violations of confidentiality include human error.


                    B.  Violations of confidentiality include management oversight.
                    C.  Violations of confidentiality are limited to direct intentional

                        attacks.

                    D.  Violations of confidentiality can occur when a transmission is
                        not properly encrypted.

                6.  STRIDE is often used in relation to assessing threats against
                    applications or operating systems. Which of the following is not an
                    element of STRIDE?

                    A.  Spoofing


                    B.  Elevation of privilege

                    C.  Repudiation

                    D.  Disclosure

                7.  If a security mechanism offers availability, then it offers a high
                    level of assurance that authorized subjects can
                    _____________________ the data, objects, and resources.

                    A.  Control

                    B.  Audit

                    C.  Access


                    D.  Repudiate

                8.  _______________ refers to keeping information confidential
                    that is personally identifiable or that might cause harm,
                    embarrassment, or disgrace to someone if revealed.

                    A.  Seclusion

                    B.  Concealment

                    C.  Privacy

                    D.  Criticality
   128   129   130   131   132   133   134   135   136   137   138