Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






2. Which describe a condition when RAM and Secondary storage are used together?






3. Bell-LaPadula model was proposed for enforcing access control in _____________________.






4. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






5. The C2 evaluation class of the _________________ offers controlled access protection.






6. The Bell-LaPadula Model is a _______________.






7. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






8. When the contents of the address defined in the program's instruction is added to that of an index register.






9. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






10. Involves sharing the processor amoung all ready processes






11. Trusted facility management is an assurance requirement only for ________________.






12. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






13. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






14. What access control technique is also known as multilevel security?






15. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






16. The TCB is the ________________ within a computer system that work together to enforce a security policy.






17. The Reserved hard drive space used to to extend RAM capabilites.






18. Which increases the performance in a computer by overlapping the steps of different instructions?






19. When a portion of primary memory is accessed by specifying the actual address of the memory location






20. Which can be used as a covert channel?






21. In the Bell-LaPadula Model the Subject's Label contains ___________________.






22. The Simple Security rule is refered to as______________.






23. The security kernel is the mechanism that _____________ of the reference monitor concept.






24. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






25. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






26. Simpler instructions that require fewer clock cycles to execute.






27. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






28. As per FDA data should be ______________________________.






29. Access control labels must be associated properly with objects.






30. The Biba Model adresses _____________________.






31. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






32. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






33. What prevents a process from accessing another process' data?






34. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






35. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






36. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






37. The Orange book does NOT Cover ________________ - And Database management systems






38. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






39. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






40. Remaining parts of the operating system






41. The *-Property rule is refered to as ____________.






42. Verification Protection






43. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






44. The group that oversees the processes of evaluation within TCSEC is?






45. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






46. Which is an ISO standard product evaluation criteria that supersedes several different criteria






47. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






48. What does the simple integrity axiom mean in the Biba model?






49. The total combination of protection mechanisms within a computer system






50. Succesfully Evaluated products are placed on?