exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 11 discussion

Actual exam question from ISC's CSSLP
Question #: 11
Topic #: 1
[All CSSLP Questions]

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

  • A. Take-Grant Protection Model
  • B. Biba Integrity Model
  • C. Bell-LaPadula Model
  • D. Access Matrix
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: A
Option A: Take-grant protection model https://en.wikipedia.org/wiki/Take-grant_protection_model The model represents a system as directed graph, where vertices are either subjects or objects. The edges between them are labeled, and the label indicates the rights that the source of the edge has over the destination. Two rights occur in every instance of the model: take and grant. They play a special role in the graph rewriting rules describing admissible changes of the graph. There are a total of four such rules: take rule allows a subject to take rights of another object (add an edge originating at the subject) grant rule allows a subject to grant own rights to another object (add an edge terminating at the subject) create rule allows a subject to create new objects (add a vertex and an edge from the subject to the new vertex) remove rule allows a subject to remove rights it has over on another object (remove an edge originating at the subject)
upvoted 2 times
74gjd_37
5 months, 2 weeks ago
- The Biba Integrity Model focuses on the protection of data integrity and prevents unauthorized modification of information by enforcing a hierarchy of integrity levels. - The Bell-LaPadula Model specifies access control policies based on confidentiality requirements in a multilevel security environment, where subjects are assigned clearance levels representing their authorizations to access certain levels of sensitive information. - The Access Matrix is used to describe the permissions associated with specific objects and subjects in a system, providing an overview of who can access what resources under which conditions. Therefore, since none of these models use directed graphs to specify rights that can be transferred or taken away, options B, C and D are incorrect.
upvoted 1 times
...
...
Etester
1 year, 10 months ago
Selected Answer: A
take and Grant protection model
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago