Information-Systems-Security-Management-Professional-(ISSMP).pdf

This preview shows page 1 - 4 out of 9 pages.

ISSMP ISC2 Information Systems Security Management(R) Professional
of time. It does not cover ideas or facts. Copyright laws protect intellectual property from misuse by other individuals. Answer option D is incorrect. A patent is a set of exclusive rights granted to anyone who invents any new and useful machine, process, composition of matter, etc. A patent enables the inventor to legally enforce his right to exclude others from using his invention. Reference: "http.//en.wikipedia.org/wiki/Trademark" QUESTION: 216 An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
QUESTION: 217 Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?
Explanation: 152
Sarah is guilty under copyright laws because pleading ignorance of copyright infringement is not an excuse.What is copyright?
Reference: "http.//en.wikipedia.org/wiki/Copyright" QUESTION: 218 Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject? A. Take-Grant Protection Model B. Bell-LaPadula Model C. Biba Integrity Model D. Access Matrix Answer: A Explanation: The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer system that follows specific rules. It shows that for specific systems the question of safety is decidable in linear time, which is in general undecidable. The model represents a system as directed graph, where vertices are either subjects or objects. The edges between them are labeled and the label indicates the rights that the source of the edge has over the destination. Two rights occur in every instance of the model. take and grant. They play a special role in the graph rewriting rules describing admissible changes of the graph.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture