SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A domain of trust that shares a single security policy and single management
Higher or equal to access class
Orange Book C
A security domain
Security Policy - Orange Book
2. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
The Thread (memory Management)
Simple Integrity Axiom
The Integrity of data within applications
Division B - Mandatory Protection Architecture
3. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
Security mechanisms and evalautes their effectivenes
Documentation - Orange Book
Stored in Reak Memory
4. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
Security Policy is clearly defined and documented
No read down
Swap Space
6. The combination of RAM - Cache and the Processor Registers
Primary storage
Access Matrix model
Access control to the objects by the subjects
Attributable - original - accurate - contemporaneous and legible
7. Mandatory Access requires that _____________ be attached to all objects.
'Dominate'
Sensitivity labels
Orange Book - B3
The rule is talking about "Reading"
8. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Thrashing
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Erasable and Programmable Read-Only Memory (EPROM)
Isolate processes
9. The *-Property rule is refered to as ____________.
Invocation Property
Scalar processors
Prevent secret information from being accessed
The "No write Down" Rule
10. As per FDA data should be ______________________________.
B3
The security perimeter
Attributable - original - accurate - contemporaneous and legible
B3
11. What does the Clark-Wilson security model focus on
TCB (Trusted Computing Base)
The Rule is talking about writing
Integrity
Swap Space
12. Which would be designated as objects on a MAC system?
Security mechanisms and evalautes their effectivenes
Files - directories and devices
The reference monitor
Higher or equal to access class
13. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
Swap Space
Complex Instruction Set Computers (CISC)
Overt channel
Assigned labels
14. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Attributable data
Compare the security labels
The Simple Security Property
Programmable Read-Only Memory (PROM)
15. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
Life Cycle Assurance Requirement
State machine model
Orange Book - A1
The Rule is talking about writing
16. The Physical memory address that the CPU uses
Absolute addresses
Trusted Distribution
The "No write Down" Rule
A Base Register (Memory Management)
17. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Orange Book - B1
In C2 - Controlled Access Protection environment
A Limit Register (Memory Management)
Models concerned with integrity
18. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
In C2 - Controlled Access Protection environment
*-Integrity Axiom
Clark-Wilson
Orange Book interpretations
19. What is called the formal acceptance of the adequacy of a system's overall security by management?
Pagefile.sys file
Accreditation
Its Clearance Label (Top Secret - Secret - or Confidential)
Isolate processes
20. When a computer uses more than one CPU in parallel to execute instructions is known as?
A Limit Register (Memory Management)
Multiprocessing
Need-to-know
Its classification label (Top Secret - Secret or confidential)
21. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Need-to-know
Absolute addresses
Prevent secret information from being accessed
System High Security Mode
22. The Security Model Incorporates the ____________ that should be enforced in the system.
A and B
Security Policy
Assigned labels
Government and military applications
23. Execute one instruction at a time.
Scalar processors
Labels - Orange Book
Simple Integrity Axiom
'Dominate'
24. In the Bell-LaPadula Model the Subject's Label contains ___________________.
The Tranqulity principle (The Bell-LaPadula Model)
Its Clearance Label (Top Secret - Secret - or Confidential)
The Security Kernel
Logical addresses
25. The C2 evaluation class of the _________________ offers controlled access protection.
C2 - Controlled Access Protection
Trusted Network Interpretation (TNI)
C1 - Discrection Security Protection is a type of environment
The Tranqulity principle (The Bell-LaPadula Model)
26. Which can be used as a covert channel?
Storage and timing
Division B - Mandatory Protection
C2 - Controlled Access Protection
The Thread (memory Management)
27. What model use an access control triples and requires that the system maintain separation of duty ?
Sensitivity labels
Clark-Wilson
Real storage
Evaluated separately
28. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
C2 - Controlled Access Protection
TCB (Trusted Computing Base)
Assigned labels
Implement software or systems in a production environment
29. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
Trusted Distribution
No read up
C1
System High Security Mode
30. Mediates all access and Functions between subjects and objects.
A1
No read down
The "No write Down" Rule
The Security Kernel
31. Documentation must be provided - including test - design - and specification document - user guides and manuals
Overt channel
Division B - Mandatory Protection
Basic Security Theorem (used in computer science) definition
Documentation - Orange Book
32. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Firmware
Security Policy
B3 - Security Domains
C2 - Controlled Access Protection
33. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
The reference monitor
In C2 - Controlled Access Protection environment
Security mechanisms and evalautes their effectivenes
Indexed addressing
34. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Division B - Mandatory Protection
B2 rating
Isolate processes
The Rule is talking about writing
35. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Totality of protection mechanisms
Storage and timing
The "No read Up" rule
A security domain
36. Access control labels must be associated properly with objects.
C2 - Controlled Access Protection
Mandatory Access Control (MAC)
Labels - Orange Book
Multiprocessing
37. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
Accountability - Orange Book
A security kernel
No read down
The Monolithic Operation system Architecture
38. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
The *-Property rule (Star property)
The TCSEC - Aka Orange Book
Polyinstantiation
Dedicated Security Mode
39. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Security Policy is clearly defined and documented
Identification - Orange Book
Examples of Layered Operating Systems
Polyinstantiation
40. The Orange book requires protection against two_____________ - which are these Timing and Storage
Types of covert channels
System High Security Mode
Division C - Discretionary Protection
Division B - Mandatory Protection Architecture
41. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
Ring 3
The security kernel
The Rule is talking about writing
Thrashing
42. Happen because input data is not checked for appropriate length at time of input
Simple Integrity Axiom
Life Cycle Assurance Requirement
The rule is talking about "Reading"
Buffer overflows
43. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
A Thread
B1 - Labeled Security rating
Orange Book - B2
Controls the checks
44. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
B2 rating
Pagefile.sys file
C1 - Discrection Security Protection is a type of environment
Clark-Wilson Model
45. A set of objects that a subject is able to access
A Domain
A Layered Operating System Architecure
A security kernel
Security Policy is clearly defined and documented
46. Individual subjects must be uniquely identified.
A security domain
Identification - Orange Book
Direct addressing
Continuous protection - O/B
47. According to the Orange Book - trusted facility management is not required for which security levels?
Sensitivity labels
Dominate the object's sensitivity label
B1
Ring 3
48. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. Permits a database to have two records that are identical except for Their classifications
Polyinstantiation
Dominate the object's sensitivity label
A1
Orange Book - B2
50. Each data object must contain a classification label and each subject must have a clearance label.
B1 - Labeled Security
B3
B1 - Labeled Security rating
Protection Rings Support
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests