Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






2. The Indexed memory addresses that software uses






3. Which increases the performance in a computer by overlapping the steps of different instructions?






4. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






5. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






6. TCSEC provides a means to evaluate ______________________.






7. Mandatory Protection






8. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






9. Mediates all access and Functions between subjects and objects.






10. Bell-LaPadula model was proposed for enforcing access control in _____________________.






11. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






12. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






13. Which in the Orange Book ratings represents the highest level of trust?






14. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






15. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






16. In the Bell-LaPadula Model the Object's Label contains ___________________.






17. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






18. Intended for environments that require systems to handle classified data.






19. What does the * (star) property mean in the Bell-LaPadula model?






20. When the address location that is specified in the program instruction contains the address of the final desired location.






21. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






22. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






23. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






24. Which is an ISO standard product evaluation criteria that supersedes several different criteria






25. Trusted facility management is an assurance requirement only for ________________.






26. The Policy must be explicit and well defined and enforced by the mechanisms within the system






27. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






28. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






29. Mandatory access control is enfored by the use of security labels.






30. Happen because input data is not checked for appropriate length at time of input






31. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






32. TCB contains The Security Kernel and all ______________.






33. Verification Protection






34. The Physical memory address that the CPU uses






35. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






36. Users need to be Identified individually to provide more precise acces control and auditing functionality.






37. When a vendor submits a product for evaluation - it submits it to the ____________.






38. What access control technique is also known as multilevel security?






39. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






40. The Security Model Incorporates the ____________ that should be enforced in the system.






41. Mandatory Access requires that _____________ be attached to all objects.






42. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






43. The security kernel is the mechanism that _____________ of the reference monitor concept.






44. Involves sharing the processor amoung all ready processes






45. Which can be used as a covert channel?






46. What does the simple integrity axiom mean in the Biba model?






47. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






48. The Biba Model adresses _____________________.






49. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






50. Contains the beginning address