Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Verification Protection






2. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






3. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






4. Bell-LaPadula model was proposed for enforcing access control in _____________________.






5. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






6. The Bell-LaPadula model Subjects and Objects are ___________.






7. Audit data must be captured and protected to enforce accountability






8. Minimal Security






9. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






10. Contains the ending address






11. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






12. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






13. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






14. The assignment of a specific individual to administer the security-related functions of a system.






15. The Bell-LaPadula Model is a _______________.






16. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






17. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






18. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






19. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






20. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






21. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






22. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






23. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






24. System Architecture that separates system functionality into Hierarchical layers






25. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






26. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






27. Which TCSEC level first addresses object reuse?






28. Mandatory Access requires that _____________ be attached to all objects.






29. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






30. The Orange book requires protection against two_____________ - which are these Timing and Storage






31. What access control technique is also known as multilevel security?






32. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






33. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






34. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






35. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






36. The Security Model Incorporates the ____________ that should be enforced in the system.






37. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






38. The Simple Security rule is refered to as______________.






39. The Orange book does NOT Cover ________________ - And Database management systems






40. What model use an access control triples and requires that the system maintain separation of duty ?






41. The combination of RAM - Cache and the Processor Registers






42. Which describe a condition when RAM and Secondary storage are used together?






43. The subject must have Need to Know for ONLY the information they are trying to access.






44. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






45. When the address location that is specified in the program instruction contains the address of the final desired location.






46. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






47. Operating System Kernel






48. In access control terms - the word "dominate" refers to ___________.






49. Contains the beginning address






50. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements