Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






2. Individual subjects must be uniquely identified.






3. Data in Cache can be accessed much more quickly than Data






4. The C2 evaluation class of the _________________ offers controlled access protection.






5. When the RAM and secondary storage are combined the result is __________.






6. Used by Windows systems to reserve the "Swap Space"






7. The Reserved hard drive space used to to extend RAM capabilites.






8. The Security Model Incorporates the ____________ that should be enforced in the system.






9. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






10. The Availability - Integrity and confidentiality requirements of multitasking operating systems






11. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






12. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






13. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






14. What does the * (star) property mean in the Bell-LaPadula model?






15. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






16. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






17. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






18. Which can be used as a covert channel?






19. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






20. Audit data must be captured and protected to enforce accountability






21. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






22. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






23. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






24. A Policy based control. All objects and systems have a sensitivity level assigned to them






25. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






26. Which increases the performance in a computer by overlapping the steps of different instructions?






27. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






28. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






29. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification


30. Which in the Orange Book ratings represents the highest level of trust?






31. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






32. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






33. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






34. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






35. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






36. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






37. Verification Protection






38. Operating System Kernel






39. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






40. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






41. What are the components of an object's sensitivity label?






42. Access control labels must be associated properly with objects.






43. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






44. Subjects and Objects cannot change their security levels once they have been instantiated (created)






45. The Bell-LaPadula model Subjects and Objects are ___________.






46. Contains the ending address






47. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






48. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






49. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






50. Can be erased - modified and upgraded.