Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which procedure scans data items and confirms their reliability in the Clark-Wilson security model?
Transformational Procedure (TP)
Integrity Verification Procedure (IVP)
Constrained data items (CDI)
Unconstrained Data Item (UDI)
The Integrity Verification Procedure (IVP) model indicates the separation of duties that must be enforced and that subjects must access data through an application. IVP scans data items and confirms integrity. The Clark-Wilson model uses the following elements: Users Active agents, Transformation procedures (TPs) Programmed abstract operations, such as read, write, and modify, Constrained data items (CDIs) Can be manipulated only by TPs, Unconstrained data items (UDIs) Can be manipulated by users via primitive read and write operations, Integrity verification procedures (IVPs) Check the consistency of CDIs
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.