<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:AGaramondPro-Regular;
panose-1:0 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:AGaramondPro-Italic;
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EstiloDeEmail17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=PT-BR link=blue vlink=purple><div class=WordSection1><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Questão 26 do <b><u>CIC2 Teste CISSP 01</u></b> está baseada na questão 5 do Domínio de Arquitetura do CBK Second Edition.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>A correção da questão 5 encontra-se na página 902 do referido livro.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Pela explicação da questão a resposta correta deveria ser Security Model ao invés de Security Policy.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Gostaria de saber se alguém tem o arquivo contendo as “erratas”do CBK Second Edition. <o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Interessados favor entrar em PVT comigo.<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>5. Which of the following describes the <b><u>rules</u></b> that need to be implemented to<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>ensure that the <b><u>security requirements</u></b> are met?<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>a. Security kernel<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>b. Security policy<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>c. Security model<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>d. Security reference monitor<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><b><u><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Correct answer is b. <o:p></o:p></span></u></b></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Security policy documents the <b><u>security requirements</u></b> of<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>an organization. Subsequently, a </span><i><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Italic'>security model </span></i><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>is a specification that describes<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>the <b><u>rules</u></b> to be implemented to support and enforce the security policy. <o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>While the security policy provides the “What” requirements needs to be met, the<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>security model provides “HOW” (the <b><u>rules</u></b> by which) the requirements will<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>be met. <o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>The part of the operating system where security features are located<o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>is the security kernel. <o:p></o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'><o:p> </o:p></span></p><p class=MsoNormal style='text-autospace:none'><span lang=EN-US style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Security reference monitor is the tamperproof module that controls the access request of software to either the data or the system.<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:10.5pt;font-family:AGaramondPro-Regular'>Page 682.</span><o:p></o:p></p></div></body></html>