SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
The *-Property rule (Star property)
C1
Dedicated Security Mode
Ring 1
2. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
Indirect addressing
C2
Storage and timing
The Clark Wilson integrity model
3. The Bell-LaPadula model Subjects and Objects are ___________.
The rule is talking about "Reading"
Assigned labels
Orange Book C
Buffer (temporary data storage area)
4. What does the simple security (ss) property mean in the Bell-LaPadula model?
The security perimeter
No read up
Overt channel
Orange Book - A1
5. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
In C2 - Controlled Access Protection environment
Enforces the rules
Real storage
Be protected from modification
6. When a computer uses more than one CPU in parallel to execute instructions is known as?
Primary storage
The "No read Up" rule
Be protected from modification
Multiprocessing
7. Which can be used as a covert channel?
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Life-cycle assurance - O/B
Storage and timing
Pipelining
8. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
The trustworthiness of an information system
Access control to the objects by the subjects
Orange Book - B3
The Simple Security Property
9. Which Orange Book evaluation level is described as "Verified Design"?
A1
Orange Book C
Mandatory Access Control (MAC)
The *-Property rule (Star property)
10. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
Orange Book - B3
Orange Book ratings
The "No write Down" Rule
Labels - Orange Book
11. What is called the formal acceptance of the adequacy of a system's overall security by management?
Security mechanisms and evalautes their effectivenes
Pipelining
Accreditation
B1 - Labeled Security rating
12. Which uses Protection Profiles and Security Targets?
A security domain
Execution Domain
International Standard 15408
Certification
13. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
Division D - Minimal Protection
attributability
Programmable Read-Only Memory (PROM)
The Security Kernel
14. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Polyinstantiation
International Standard 15408
Mandatory Access Control (MAC)
Constrained
15. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Simple Integrity Axiom
Its classification label (Top Secret - Secret or confidential)
Disclosure of residual data
Government and military applications
16. Succesfully Evaluated products are placed on?
B2
Buffer (temporary data storage area)
In C2 - Controlled Access Protection environment
The Evaluated Products List (EPL) with their corresponding rating
17. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Labels - Orange Book
B1
Orange Book ratings
Real storage
18. The Simple Security rule is refered to as______________.
*-Integrity Axiom
Ring 2
The "No read Up" rule
Security Policy
19. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Most commonly used approach
Ring 2
Life Cycle Assurance Requirement
Indexed addressing
20. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
B3
B2
Implement software or systems in a production environment
Prohibits
21. Each data object must contain a classification label and each subject must have a clearance label.
The Thread (memory Management)
Physical security
B1 - Labeled Security
Mandatory Access Control (MAC)
22. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Enforces the rules
Models concerned with integrity
Life-cycle assurance - O/B
C1 - Discretionary Security Protection
23. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
Reduced Instruction Set Computers (RISC)
B3
C1
The security kernel
24. Which is an ISO standard product evaluation criteria that supersedes several different criteria
The National Computer Security Center (NCSC)
B2
Direct addressing
The Common Criteria
25. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Accountability - Orange Book
C2 - Controlled Access Protection
Division C - Discretionary Protection
Trusted facility management
26. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
B3 - Rating
The Rule is talking about writing
Overt channel
Access Matrix model
27. When the RAM and secondary storage are combined the result is __________.
C2
Virtual Memory
Controls the checks
Division B - Mandatory Protection Architecture
28. Execute one instruction at a time.
Trusted facility management
Scalar processors
Prohibits
Secondary Storage
29. Operating System Kernel
The Clark Wilson integrity model
Ring 0
Scalar processors
Thrashing
30. Used by Windows systems to reserve the "Swap Space"
Need-to-know
Pagefile.sys file
Programmable Read-Only Memory (PROM)
security protection mechanisms
31. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
Pipelining
Orange Book C
Execution Domain
Simple Security Rule
32. The Reserved hard drive space used to to extend RAM capabilites.
System High Security Mode
Swap Space
The Common Criteria
The *-Property rule (Star property)
33. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
The TCSEC - Aka Orange Book
The National Computer Security Center (NCSC)
Covert channels
Trusted Distribution
34. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Invocation Property
Types of covert channels
D
Storage and timing
35. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Logical addresses
Continuous protection - O/B
No read up
Pagefile.sys file
36. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Controls the checks
Isolate processes
Controlling unauthorized downgrading of information
Overt channel
38. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Protection Rings Support
Bell-LaPadula Model
No read down
Orange Book - D
39. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Compare the security labels
Storage and timing
The National Computer Security Center (NCSC)
Continuous protection - O/B
40. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Swap Space
Trusted hardware - Software and Firmware
B3 - Rating
Compare the security labels
41. Mediates all access and Functions between subjects and objects.
A Thread
Operational assurance requirements
The Security Kernel
Certification
42. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
The Thread (memory Management)
Attributable data
Multilevel Security Policies
43. The group that oversees the processes of evaluation within TCSEC is?
Implement software or systems in a production environment
A Limit Register (Memory Management)
Trusted Products Evaluation Program (TPEP)
Storage and timing
44. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Models concerned with integrity
Ring 1
B3
System High Security Mode
45. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
C2
Government and military applications
Indexed addressing
The security perimeter
46. Which in the Orange Book ratings represents the highest level of trust?
Orange Book B
Dominate the object's sensitivity label
Orange Book - B3
B2
47. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
B1 - Labeled Security rating
The TCSEC - Aka Orange Book
Programmable Read-Only Memory (PROM)
TCB (Trusted Computing Base)
48. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
All Mandatory Access Control (MAC) systems
Security Policy is clearly defined and documented
attributability
The Security Kernel
49. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
The Evaluated Products List (EPL) with their corresponding rating
Buffer (temporary data storage area)
Scalar processors
C2 - Controlled Access Protection
50. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Models concerned with integrity
Direct addressing
Stored in Reak Memory
Mandatory Access Control (MAC)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests