Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the simple integrity axiom mean in the Biba model?






2. What access control technique is also known as multilevel security?






3. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






4. The Simple Security rule is refered to as______________.






5. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






6. In access control terms - the word "dominate" refers to ___________.






7. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






8. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






9. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






10. When the address location that is specified in the program instruction contains the address of the final desired location.






11. Bell-LaPadula model was proposed for enforcing access control in _____________________.






12. What does the * (star) property mean in the Bell-LaPadula model?






13. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






14. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






15. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. Mandatory Protection






17. Which can be used as a covert channel?






18. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






19. What does the simple security (ss) property mean in the Bell-LaPadula model?






20. A Policy based control. All objects and systems have a sensitivity level assigned to them






21. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






22. The Indexed memory addresses that software uses






23. Individual subjects must be uniquely identified.






24. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






25. Which is an ISO standard product evaluation criteria that supersedes several different criteria






26. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






27. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






28. The assignment of a specific individual to administer the security-related functions of a system.






29. A system uses the Reference Monitor to ___________________ of a subject and an object?






30. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






31. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






32. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






33. Audit data must be captured and protected to enforce accountability






34. Each data object must contain a classification label and each subject must have a clearance label.






35. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






36. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






37. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. Verification Protection






39. Which increases the performance in a computer by overlapping the steps of different instructions?






40. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






41. The Biba Model adresses _____________________.






42. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






43. Trusted facility management is an assurance requirement only for ________________.






44. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






45. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






46. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






47. All users have a clearance for and a formal need to know about - all data processed with the system.






48. The Availability - Integrity and confidentiality requirements of multitasking operating systems






49. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






50. The Orange book requires protection against two_____________ - which are these Timing and Storage







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests