Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which in the Orange Book ratings represents the highest level of trust?






2. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






3. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






4. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






5. When the RAM and secondary storage are combined the result is __________.






6. Mandatory Access requires that _____________ be attached to all objects.






7. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






8. The TCB is the ________________ within a computer system that work together to enforce a security policy.






9. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






10. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






11. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






12. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






13. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






14. The Biba Model adresses _____________________.






15. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






16. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






17. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






18. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






19. In the Bell-LaPadula Model the Subject's Label contains ___________________.






20. Bell-LaPadula model was proposed for enforcing access control in _____________________.






21. Trusted facility management is an assurance requirement only for ________________.






22. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






23. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






24. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






25. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






26. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






27. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






28. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






29. Remaining parts of the operating system






30. Permits a database to have two records that are identical except for Their classifications






31. All users have a clearance for and a formal need to know about - all data processed with the system.






32. When a computer uses more than one CPU in parallel to execute instructions is known as?






33. Audit data must be captured and protected to enforce accountability






34. Which increases the performance in a computer by overlapping the steps of different instructions?






35. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






36. A set of objects that a subject is able to access






37. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






38. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






39. Which TCSEC level first addresses object reuse?






40. A subject at a given clearance may not read an object at a higher classification






41. Access control labels must be associated properly with objects.






42. A system uses the Reference Monitor to ___________________ of a subject and an object?






43. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






44. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






45. The Simple Security rule is refered to as______________.






46. Another word for Primary storage and distinguishes physical memory from virtual memory.






47. System Architecture that separates system functionality into Hierarchical layers






48. Contains the beginning address






49. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






50. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.