PTS:1REF:238-239COMPLETION1.To design a security blueprint, an organization can use a(n) ____________________, which is a generic blueprint offered by a service organization.
PTS:1REF:2132.ISO/IEC 27001 provides implementation details using a(n) ____________________ cycle.
PTS:1REF:2293.The ____________________ principle is based on the requirement that people are not allowed to viewdata simply because it falls within their level of clearance.
PTS:1REF:2174.____________________ channels are unauthorized or unintended methods of communications hidden inside a computer system, and include storage and timing channels.
PTS:1REF:2205.In the COSO framework, ___________ activities include those policies and procedures that support management directives.
PTS:1REF:238MATCHINGa.blueprintf.sensitivity levelsb.DACg.storage channelsc.content-dependent access controlsh.task-based controlsd.rule-based access controlsi.timing channelse.separation of dutiesj.TCB1.controls where access to a specific set of information may be dependent on its content2.One of the TCSEC’s covert channels, which transmit information by managing the relative timing of events