Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In access control terms - the word "dominate" refers to ___________.






2. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






3. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






4. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






5. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






6. Contains the ending address






7. Simpler instructions that require fewer clock cycles to execute.






8. The total combination of protection mechanisms within a computer system






9. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






10. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






11. Which uses Protection Profiles and Security Targets?






12. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






13. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






14. Operating System Kernel






15. Which would be designated as objects on a MAC system?






16. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






17. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






18. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






19. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






20. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






21. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






22. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






23. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






24. TCSEC provides a means to evaluate ______________________.






25. The Physical memory address that the CPU uses






26. What does the Clark-Wilson security model focus on






27. Which is an ISO standard product evaluation criteria that supersedes several different criteria






28. Involves sharing the processor amoung all ready processes






29. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






30. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






31. Another word for Primary storage and distinguishes physical memory from virtual memory.






32. The Availability - Integrity and confidentiality requirements of multitasking operating systems






33. Based on a known address with an offset value applied.






34. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






35. When the address location that is specified in the program instruction contains the address of the final desired location.






36. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






37. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






38. What are the components of an object's sensitivity label?






39. Access control labels must be associated properly with objects.






40. Each data object must contain a classification label and each subject must have a clearance label.






41. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






42. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






43. What does the * (star) property mean in the Bell-LaPadula model?






44. Which Orange Book evaluation level is described as "Verified Design"?






45. When a vendor submits a product for evaluation - it submits it to the ____________.






46. The Security Model Incorporates the ____________ that should be enforced in the system.






47. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






48. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






49. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






50. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.