Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What access control technique is also known as multilevel security?






2. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






3. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






4. Which is an ISO standard product evaluation criteria that supersedes several different criteria






5. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






6. Which can be used as a covert channel?






7. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






8. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






9. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






10. Which increases the performance in a computer by overlapping the steps of different instructions?






11. A subject at a given clearance may not read an object at a higher classification






12. The Physical memory address that the CPU uses






13. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






14. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






15. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






16. According to the Orange Book - trusted facility management is not required for which security levels?






17. Documentation must be provided - including test - design - and specification document - user guides and manuals






18. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






19. The subject must have Need to Know for ONLY the information they are trying to access.






20. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






21. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






22. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






23. I/O drivers and utilities






24. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






25. Which would be designated as objects on a MAC system?






26. Discretionary protection






27. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






28. Subjects and Objects cannot change their security levels once they have been instantiated (created)






29. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






30. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






31. The Reserved hard drive space used to to extend RAM capabilites.






32. The TCB is the ________________ within a computer system that work together to enforce a security policy.






33. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






34. Mediates all access and Functions between subjects and objects.






35. As per FDA data should be ______________________________.






36. The Simple Security rule is refered to as______________.






37. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






38. Users need to be Identified individually to provide more precise acces control and auditing functionality.






39. Should always trace to individuals responsible for observing and recording the data






40. The combination of RAM - Cache and the Processor Registers






41. The Biba Model adresses _____________________.






42. When a vendor submits a product for evaluation - it submits it to the ____________.






43. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






44. Verification Protection






45. The Availability - Integrity and confidentiality requirements of multitasking operating systems






46. Succesfully Evaluated products are placed on?






47. When a computer uses more than one CPU in parallel to execute instructions is known as?






48. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






49. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






50. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise