Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Bell-LaPadula Model is a _______________.






2. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






3. Which is an ISO standard product evaluation criteria that supersedes several different criteria






4. When the contents of the address defined in the program's instruction is added to that of an index register.






5. The Simple Security rule is refered to as______________.






6. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






7. The total combination of protection mechanisms within a computer system






8. Audit data must be captured and protected to enforce accountability






9. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






10. Permits a database to have two records that are identical except for Their classifications






11. The assignment of a specific individual to administer the security-related functions of a system.






12. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






13. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






14. Contains an Address of where the instruction and dara reside that need to be processed.






15. When a computer uses more than one CPU in parallel to execute instructions is known as?






16. Which would be designated as objects on a MAC system?






17. Individual subjects must be uniquely identified.






18. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






19. The Indexed memory addresses that software uses






20. System Architecture that separates system functionality into Hierarchical layers






21. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






22. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






23. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






24. Users need to be Identified individually to provide more precise acces control and auditing functionality.






25. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






26. Execute one instruction at a time.






27. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






28. Based on a known address with an offset value applied.






29. The Physical memory address that the CPU uses






30. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






31. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






32. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






33. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






34. The Orange book does NOT Cover ________________ - And Database management systems






35. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






36. Contains the beginning address






37. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






38. The *-Property rule is refered to as ____________.






39. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






40. What does the Clark-Wilson security model focus on






41. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






42. What does the simple integrity axiom mean in the Biba model?






43. Used by Windows systems to reserve the "Swap Space"






44. What access control technique is also known as multilevel security?






45. Which can be used as a covert channel?






46. When the RAM and secondary storage are combined the result is __________.






47. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






48. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






49. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






50. Requires more stringent authentication mechanisms and well-defined interfaces among layers.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests