SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
Swap Space
An abstract machine
Orange Book - D
Attributable - original - accurate - contemporaneous and legible
2. A type of memory used for High-speed writing and reading activities.
Cache Memory
A Limit Register (Memory Management)
The Strong star property rule
Integrity
3. Which increases the performance in a computer by overlapping the steps of different instructions?
Orange Book - B1
Protection Rings Support
Pipelining
Its Clearance Label (Top Secret - Secret - or Confidential)
4. Which can be used as a covert channel?
The Rule is talking about writing
A Domain
Storage and timing
The Simple Security Property
5. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
C2 - Controlled Access Protection
B3
Multitasking
Trusted Network Interpretation (TNI)
6. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
Clark-Wilson
Pipelining
The Rule is talking about writing
C1 - Discrection Security Protection is a type of environment
7. Should always trace to individuals responsible for observing and recording the data
B1 - Labeled Security
Primary storage
Overt channel
Attributable data
8. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Which TCSEC level first addresses object reuse?
Secondary Storage
Multiprocessing
C2
Orange Book - B2
10. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
Ring 2
A lattice of Intergrity Levels
C2 - Controlled Access Protection
A Domain
11. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
A security domain
The Security Kernel
NOT Integrity
Ring 1
12. In the Bell-LaPadula Model the Object's Label contains ___________________.
Prohibits
The Red Book
Invocation Property
Its classification label (Top Secret - Secret or confidential)
13. The Reserved hard drive space used to to extend RAM capabilites.
Indirect addressing
The security kernel
Types of covert channels
Swap Space
14. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Bell-LaPadula Model
TCB (Trusted Computing Base)
A1
Orange Book - A1
15. Mandatory Access requires that _____________ be attached to all objects.
Controls the checks
Sensitivity labels
Programmable Read-Only Memory (PROM)
Trusted Products Evaluation Program (TPEP)
16. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Discretionary Security Property (ds-property)
Invocation Property
Subject to Object Model
Protection Rings Support
17. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
The National Computer Security Center (NCSC)
Implement software or systems in a production environment
Trusted Network Interpretation (TNI)
Orange Book interpretations
18. The C2 evaluation class of the _________________ offers controlled access protection.
C2 - Controlled Access Protection
B3 - Security Domains
Trusted Network Interpretation (TNI)
Mandatory Access Control (MAC)
19. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Execution Domain
The reference monitor
C1 - Discrection Security Protection is a type of environment
B3
20. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Subject to Object Model
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Pipelining
Networks and Communications
21. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
The Strong star property rule
Complex Instruction Set Computers (CISC)
System High Security Mode
Networks and Communications
22. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
The Security Kernel
Life Cycle Assurance Requirement
Files - directories and devices
Its classification label (Top Secret - Secret or confidential)
23. When the RAM and secondary storage are combined the result is __________.
A Domain
Orange Book A
Virtual Memory
Direct Addressing
24. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
B1
The National Computer Security Center (NCSC)
Virtual Memory
An abstract machine
25. When a portion of primary memory is accessed by specifying the actual address of the memory location
The security perimeter
A single classification and a Compartment Set
A lattice of Intergrity Levels
Direct addressing
26. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
The trustworthiness of an information system
Security rating B
The Rule is talking about writing
The "No read Up" rule
27. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Stored in Reak Memory
Evaluated separately
Orange Book ratings
B2
28. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
B3 - Security Domains
security protection mechanisms
Multilevel Security Policies
Dedicated Security Mode
29. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Orange Book ratings
Sensitivity labels
Subject to Object Model
The TCSEC - Aka Orange Book
30. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
B1 - Labeled Security
Security mechanisms and evalautes their effectivenes
Administrative declaration
Operational assurance requirements
31. What does the simple integrity axiom mean in the Biba model?
No read down
Files - directories and devices
Pipelining
Direct Addressing
32. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Erasable and Programmable Read-Only Memory (EPROM)
The Integrity of data within applications
Division D - Minimal Protection
The security perimeter
33. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
B3 - Rating
Highly secure systems (B2 - B3 and A1)
Disclosure of residual data
Polyinstantiation
34. The subject must have Need to Know for ONLY the information they are trying to access.
A lattice of Intergrity Levels
Covert channels
B3 - Rating
System High Security Mode
35. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Continuous protection - O/B
Trusted Network Interpretation (TNI)
Implement software or systems in a production environment
Discretionary Security Property (ds-property)
36. Trusted facility management is an assurance requirement only for ________________.
Highly secure systems (B2 - B3 and A1)
The TCSEC - Aka Orange Book
C1 - Discrection Security Protection is a type of environment
A1
37. Mandatory Protection
Ring 3
B2 rating
Execution Domain
Orange Book B
38. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
A1 - Rating
Orange Book - B2
The Biba Model
C2 - Controlled Access Protection
39. A domain of trust that shares a single security policy and single management
C1
A security domain
Security rating B
The Clark Wilson integrity model
40. What prevents a process from accessing another process' data?
Pagefile.sys file
Administrative declaration
Orange Book - B1
Process isolation
41. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Orange Book - B2
The security kernel
Polyinstantiation
Orange Book - B3
42. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
Sensitivity labels
Virtual storage
C2 - Controlled Access Protection
Process isolation
43. According to the Orange Book - trusted facility management is not required for which security levels?
Multiprocessing
The Strong star property rule
Dominate the object's sensitivity label
B1
44. Remaining parts of the operating system
State machine model
Mandatory Access Control (MAC)
Ring 1
System High Security Mode
45. The *-Property rule is refered to as ____________.
Dedicated Security Mode
The National Computer Security Center (NCSC)
The "No write Down" Rule
Controlling unauthorized downgrading of information
46. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Multiprocessing
B3
Operational assurance requirements
A Domain
47. TCB contains The Security Kernel and all ______________.
Fail safe
security protection mechanisms
The Common Criteria
A Thread
48. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
A single classification and a Compartment Set
Basic Security Theorem (used in computer science) definition
Orange Book - D
Dominate the object's sensitivity label
49. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
D
Higher or equal to access class
The Biba Model
C1 - Discrection Security Protection is a type of environment
50. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Accountability - Orange Book
Access control to the objects by the subjects
The Integrity of data within applications
security protection mechanisms