Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






2. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






3. TCSEC provides a means to evaluate ______________________.






4. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






5. A domain of trust that shares a single security policy and single management






6. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






7. The Indexed memory addresses that software uses






8. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






9. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






10. The Orange book requires protection against two_____________ - which are these Timing and Storage






11. Intended for environments that require systems to handle classified data.






12. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






13. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






14. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






15. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






16. Succesfully Evaluated products are placed on?






17. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






18. When the RAM and secondary storage are combined the result is __________.






19. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






20. Mandatory Access requires that _____________ be attached to all objects.






21. What does the simple security (ss) property mean in the Bell-LaPadula model?






22. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






23. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






24. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






25. In the Bell-LaPadula Model the Object's Label contains ___________________.






26. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






27. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






28. Which describe a condition when RAM and Secondary storage are used together?






29. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






30. Documentation must be provided - including test - design - and specification document - user guides and manuals






31. Simpler instructions that require fewer clock cycles to execute.






32. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






33. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






34. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






35. The subject must have Need to Know for ONLY the information they are trying to access.






36. The security kernel is the mechanism that _____________ of the reference monitor concept.






37. The Simple Security rule is refered to as______________.






38. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






39. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






40. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






42. What model use an access control triples and requires that the system maintain separation of duty ?






43. The Policy must be explicit and well defined and enforced by the mechanisms within the system






44. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






45. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






46. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






47. Which uses Protection Profiles and Security Targets?






48. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






49. Applications and user activity






50. A type of memory used for High-speed writing and reading activities.