Effective CISSP Questions

Your organization sets out an access control policy. You are evaluating access control mechanisms to support it. Which of the following is correct? (Wentz QOTD)
A. Mandatory and discretionary protection are mutually exclusive in a trusted computer system.
B. Bell-Lapadula and Biba models are mutually exclusive in a trusted computer system.
C. Conflict-of-interest classes are mutually exclusive in the Brewer and Nash model.
D. Zero Trust and the castle-and-moat network security model are mutually exclusive.

Read more of this post

Wentz Wu | November 16, 2021 at 6:31 pm | Categories: QOTD, Technology, 每日一題 | URL: https://wp.me/p2X0VJ-915
Comment