Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






2. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






3. The Simple Security rule is refered to as______________.






4. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






5. Based on a known address with an offset value applied.






6. Documentation must be provided - including test - design - and specification document - user guides and manuals






7. Data in Cache can be accessed much more quickly than Data






8. When a computer uses more than one CPU in parallel to execute instructions is known as?






9. A domain of trust that shares a single security policy and single management






10. Users need to be Identified individually to provide more precise acces control and auditing functionality.






11. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






12. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






13. Mediates all access and Functions between subjects and objects.






14. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






15. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






16. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






17. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






18. TCB contains The Security Kernel and all ______________.






19. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






20. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






21. The Physical memory address that the CPU uses






22. Can be erased - modified and upgraded.






23. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






24. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






25. The Bell-LaPadula Model is a _______________.






26. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






27. Mandatory Access requires that _____________ be attached to all objects.






28. The assignment of a specific individual to administer the security-related functions of a system.






29. What access control technique is also known as multilevel security?






30. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






31. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






32. The Availability - Integrity and confidentiality requirements of multitasking operating systems






33. Trusted facility management is an assurance requirement only for ________________.






34. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






35. The group that oversees the processes of evaluation within TCSEC is?






36. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






37. Which TCSEC level first addresses object reuse?






38. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






39. The C2 evaluation class of the _________________ offers controlled access protection.






40. Which is a straightforward approach that provides access rights to subjects for objects?






41. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






42. Individual subjects must be uniquely identified.






43. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






44. When a vendor submits a product for evaluation - it submits it to the ____________.






45. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






46. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






47. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






48. When the RAM and secondary storage are combined the result is __________.






49. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






50. The Policy must be explicit and well defined and enforced by the mechanisms within the system