Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Security Model Incorporates the ____________ that should be enforced in the system.






2. The Biba Model adresses _____________________.






3. Users need to be Identified individually to provide more precise acces control and auditing functionality.






4. Bell-LaPadula model was proposed for enforcing access control in _____________________.






5. When the address location that is specified in the program instruction contains the address of the final desired location.






6. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






7. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






8. Contains the beginning address






9. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






10. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






11. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






12. Which is a straightforward approach that provides access rights to subjects for objects?






13. Access control labels must be associated properly with objects.






14. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






15. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






16. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






17. Which Orange Book evaluation level is described as "Verified Design"?






18. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






19. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






20. The combination of RAM - Cache and the Processor Registers






21. Involves sharing the processor amoung all ready processes






22. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






23. Documentation must be provided - including test - design - and specification document - user guides and manuals






24. Mediates all access and Functions between subjects and objects.






25. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






26. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






27. Minimal Security






28. Applications and user activity






29. Intended for environments that require systems to handle classified data.






30. Which increases the performance in a computer by overlapping the steps of different instructions?






31. What does the Clark-Wilson security model focus on






32. Mandatory access control is enfored by the use of security labels.






33. What is called the formal acceptance of the adequacy of a system's overall security by management?






34. Execute one instruction at a time.






35. What does the * (star) property mean in the Bell-LaPadula model?






36. The assignment of a specific individual to administer the security-related functions of a system.






37. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






38. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






39. The Physical memory address that the CPU uses






40. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






41. Which TCSEC level first addresses object reuse?






42. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






43. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






44. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






45. Succesfully Evaluated products are placed on?






46. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






47. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






49. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






50. When a vendor submits a product for evaluation - it submits it to the ____________.