Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What model use an access control triples and requires that the system maintain separation of duty ?






2. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






3. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






4. The Bell-LaPadula Model is a _______________.






5. Permits a database to have two records that are identical except for Their classifications






6. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






7. Succesfully Evaluated products are placed on?






8. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






9. A type of memory used for High-speed writing and reading activities.






10. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






11. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






12. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






13. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






14. The Simple Security rule is refered to as______________.






15. What prevents a process from accessing another process' data?






16. TCB contains The Security Kernel and all ______________.






17. Audit data must be captured and protected to enforce accountability






18. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






19. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






20. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






21. When the contents of the address defined in the program's instruction is added to that of an index register.






22. Which is a straightforward approach that provides access rights to subjects for objects?






23. What does the * (star) property mean in the Bell-LaPadula model?






24. Each data object must contain a classification label and each subject must have a clearance label.






25. What does the simple integrity axiom mean in the Biba model?






26. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






27. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






28. Should always trace to individuals responsible for observing and recording the data






29. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






30. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






31. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






32. System Architecture that separates system functionality into Hierarchical layers






33. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






34. When the RAM and secondary storage are combined the result is __________.






35. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






36. The security kernel is the mechanism that _____________ of the reference monitor concept.






37. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






38. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






39. Intended for environments that require systems to handle classified data.






40. What does the simple security (ss) property mean in the Bell-LaPadula model?






41. Which can be used as a covert channel?






42. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






43. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






44. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






45. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






46. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






47. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






48. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






49. The Physical memory address that the CPU uses






50. Used by Windows systems to reserve the "Swap Space"