SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Involves sharing the processor amoung all ready processes
The Trusted Computing Base (TCB)
B3
Multitasking
Programmable Read-Only Memory (PROM)
2. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
C2
Division B - Mandatory Protection Architecture
NOT Integrity
Isolate processes
3. Contains the ending address
Access control to the objects by the subjects
A Limit Register (Memory Management)
The security perimeter
An abstract machine
4. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Prevent secret information from being accessed
Complex Instruction Set Computers (CISC)
Ring 3
Overt channel
5. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Networks and Communications
B1
Totality of protection mechanisms
Execution Domain
6. Minimal Security
An abstract machine
B1 - Labeled Security
Its Clearance Label (Top Secret - Secret - or Confidential)
Orange Book - D
7. What access control technique is also known as multilevel security?
The rule is talking about "Reading"
A and B
Mandatory access control
Models concerned with integrity
8. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
Simple Security Rule
Orange Book ratings
System High Security Mode
The trustworthiness of an information system
9. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Multilevel Security Policies
Virtual storage
The Monolithic Operation system Architecture
Implement software or systems in a production environment
10. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
Highly secure systems (B2 - B3 and A1)
Its Clearance Label (Top Secret - Secret - or Confidential)
The security kernel
Multiprocessing
11. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
A Thread
A single classification and a Compartment Set
Direct addressing
B3
12. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Virtual Memory
Orange Book ratings
Implement software or systems in a production environment
Life Cycle Assurance Requirement
13. Another word for Primary storage and distinguishes physical memory from virtual memory.
Orange Book - A1
B2 - Structured Protection
All Mandatory Access Control (MAC) systems
Real storage
14. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
A1 - Rating
Process isolation
C2 - Controlled Access Protection
Direct Addressing
15. Succesfully Evaluated products are placed on?
State machine model
The Rule is talking about writing
The Evaluated Products List (EPL) with their corresponding rating
Discretionary Security Property (ds-property)
16. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
Physical security
The reference monitor
A security kernel
Mandatory access control
17. TCB contains The Security Kernel and all ______________.
security protection mechanisms
Attributable data
Execution Domain
C1
18. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
The Evaluated Products List (EPL) with their corresponding rating
Simple Integrity Axiom
First evaluation class
C2
19. Discretionary protection
System High Security Mode
The National Computer Security Center (NCSC)
Orange Book C
C2
20. Can be erased - modified and upgraded.
Accreditation
Subject to Object Model
Programmable Read-Only Memory (PROM)
Erasable and Programmable Read-Only Memory (EPROM)
21. Contains the beginning address
The Evaluated Products List (EPL) with their corresponding rating
Trusted facility management
A Base Register (Memory Management)
C2 - Controlled Access Protection
22. The Orange book does NOT Cover ________________ - And Database management systems
No read down
Models concerned with integrity
Networks and Communications
Ring 0
23. Permits a database to have two records that are identical except for Their classifications
attributability
Absolute addresses
Polyinstantiation
Assigned labels
24. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
Examples of Layered Operating Systems
Simple Integrity Axiom
Clark-Wilson Model
C1 - Discrection Security Protection is a type of environment
25. Mediates all access and Functions between subjects and objects.
Bell-LaPadula Model
The Security Kernel
Multitasking
Complex Instruction Set Computers (CISC)
26. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
A single classification and a Compartment Set
D
Buffer overflows
The security perimeter
27. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Mandatory Access Control (MAC)
Its Clearance Label (Top Secret - Secret - or Confidential)
Controlling unauthorized downgrading of information
Be protected from modification
28. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Covert channels
Dominate the object's sensitivity label
Complex Instruction Set Computers (CISC)
C1 - Discrection Security Protection is a type of environment
29. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
All Mandatory Access Control (MAC) systems
Process isolation
Ring 1
Highly secure systems (B2 - B3 and A1)
30. Mandatory Protection
No write down
Orange Book B
Direct Addressing
Trusted hardware - Software and Firmware
31. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
Secondary Storage
A single classification and a Compartment Set
C2
B3 - Rating
32. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
B3
Pagefile.sys file
Swap Space
Types of covert channels
33. Audit data must be captured and protected to enforce accountability
Discretionary Security Property (ds-property)
Accountability - Orange Book
Higher or equal to access class
No write down
34. The security kernel is the mechanism that _____________ of the reference monitor concept.
B2
Ring 2
'Dominate'
Enforces the rules
35. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
A Thread
Dedicated Security Mode
International Standard 15408
All Mandatory Access Control (MAC) systems
36. Happen because input data is not checked for appropriate length at time of input
Discretionary Security Property (ds-property)
Its classification label (Top Secret - Secret or confidential)
Buffer overflows
A single classification and a Compartment Set
37. Simpler instructions that require fewer clock cycles to execute.
Cache Memory
An abstract machine
Reduced Instruction Set Computers (RISC)
C1 - Discrection Security Protection is a type of environment
38. System Architecture that separates system functionality into Hierarchical layers
No write down
Division C - Discretionary Protection
A Layered Operating System Architecure
Security Policy
39. Which increases the performance in a computer by overlapping the steps of different instructions?
Higher or equal to access class
Pipelining
Absolute addresses
Covert channels
40. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
B3 - Security Domains
Scalar processors
No write down
Government and military applications
41. A type of memory used for High-speed writing and reading activities.
Relative Addresses
Cache Memory
Documentation - Orange Book
The National Computer Security Center (NCSC)
42. What does the Clark-Wilson security model focus on
B1 - Labeled Security
Physical security
Accountability - Orange Book
Integrity
43. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
Isolate processes
Examples of Layered Operating Systems
The Red Book
Ring 2
44. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
Execution Domain
B1
Division D - Minimal Protection
State machine model
45. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Trusted Distribution
Stored in Reak Memory
The Security Kernel
Certification
46. When the address location that is specified in the program instruction contains the address of the final desired location.
Multilevel Security Policies
Indirect addressing
Real storage
A Thread
47. A subject at a given clearance may not read an object at a higher classification
The Simple Security Property
No write down
Simple Integrity Axiom
Pipelining
48. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Relative Addresses
Orange Book interpretations
Trusted Network Interpretation (TNI)
Prohibits
49. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
Highly secure systems (B2 - B3 and A1)
Division C - Discretionary Protection
Execution Domain
50. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Physical security
Models concerned with integrity
Identification - Orange Book
Need-to-know