SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Discretionary protection
A Thread
Orange Book interpretations
Operational assurance requirements
Orange Book C
2. Which uses Protection Profiles and Security Targets?
'Dominate'
International Standard 15408
Swap Space
Orange Book - B2
3. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
No read up
Absolute addresses
Division B - Mandatory Protection Architecture
Examples of Layered Operating Systems
4. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.
Orange Book - B1
Life-cycle assurance - O/B
Compare the security labels
The "No write Down" Rule
5. A subject at a given clearance may not read an object at a higher classification
Bell-LaPadula Model
Multiprocessing
Indexed addressing
The Simple Security Property
6. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Reduced Instruction Set Computers (RISC)
Enforces the rules
Controls the checks
The reference monitor
7. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
Accreditation
The Red Book
Invocation Property
Direct Addressing
8. Users need to be Identified individually to provide more precise acces control and auditing functionality.
C2 - Controlled Access Protection
Assigned labels
Most commonly used approach
Orange Book ratings
9. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Primary storage
Operational assurance requirements
The security kernel
C2
10. When a portion of primary memory is accessed by specifying the actual address of the memory location
Direct addressing
A and B
Accreditation
Types of covert channels
11. The Biba Model adresses _____________________.
Orange Book - B2
Trusted facility management
The Integrity of data within applications
Pipelining
12. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Life-cycle assurance - O/B
C2 - Controlled Access Protection
The Evaluated Products List (EPL) with their corresponding rating
13. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Multilevel Security Policies
Division C - Discretionary Protection
Higher or equal to access class
The TCSEC - Aka Orange Book
14. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
The "No write Down" Rule
Life-cycle assurance - O/B
Ring 1
Isolate processes
15. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Assigned labels
Orange Book ratings
Indexed addressing
Division B - Mandatory Protection
16. The C2 evaluation class of the _________________ offers controlled access protection.
Be protected from modification
State machine model
The Evaluated Products List (EPL) with their corresponding rating
Trusted Network Interpretation (TNI)
17. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Clark-Wilson Model
The TCSEC - Aka Orange Book
Orange Book - B3
The security perimeter
18. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Absolute addresses
B2 rating
Orange Book - B3
Access control to the objects by the subjects
19. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Indirect addressing
Overt channel
The TCSEC - Aka Orange Book
The National Computer Security Center (NCSC)
20. Mandatory Access requires that _____________ be attached to all objects.
The Biba Model
*-Integrity Axiom
The trustworthiness of an information system
Sensitivity labels
21. Involves sharing the processor amoung all ready processes
Multitasking
Pagefile.sys file
Ring 3
Attributable - original - accurate - contemporaneous and legible
22. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
C2 - Controlled Access Protection
The Common Criteria
Isolate processes
Secondary Storage
23. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Orange Book A
Covert channels
Erasable and Programmable Read-Only Memory (EPROM)
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
24. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
International Standard 15408
Erasable and Programmable Read-Only Memory (EPROM)
Types of covert channels
Access control to the objects by the subjects
25. Permits a database to have two records that are identical except for Their classifications
Primary storage
B1 - Labeled Security rating
Polyinstantiation
The Monolithic Operation system Architecture
26. I/O drivers and utilities
Dominate the object's sensitivity label
Ring 2
Trusted Products Evaluation Program (TPEP)
A security domain
27. A set of objects that a subject is able to access
C2 - Controlled Access Protection
Its Clearance Label (Top Secret - Secret - or Confidential)
In C2 - Controlled Access Protection environment
A Domain
28. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
C2 - Controlled Access Protection
Logical addresses
Accountability - Orange Book
Buffer (temporary data storage area)
29. The Bell-LaPadula Model is a _______________.
C1
A Layered Operating System Architecure
Subject to Object Model
Higher or equal to access class
30. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Multilevel Security Policies
A single classification and a Compartment Set
First evaluation class
Need-to-know
31. Audit data must be captured and protected to enforce accountability
Accountability - Orange Book
C1
C2 - Controlled Access Protection
Controls the checks
32. Contains an Address of where the instruction and dara reside that need to be processed.
Its classification label (Top Secret - Secret or confidential)
Trusted Products Evaluation Program (TPEP)
The Thread (memory Management)
The *-Property rule (Star property)
33. The Orange book does NOT Cover ________________ - And Database management systems
Networks and Communications
The Evaluated Products List (EPL) with their corresponding rating
Physical security
The Thread (memory Management)
34. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The security perimeter
The Trusted Computing Base (TCB)
No read up
Scalar processors
35. Which TCSEC level first addresses object reuse?
A security kernel
Most commonly used approach
C2
Polyinstantiation
36. What does the simple security (ss) property mean in the Bell-LaPadula model?
Mandatory Access Control (MAC)
Invocation Property
No read up
Multiprocessing
37. Operating System Kernel
Orange Book B
A Base Register (Memory Management)
Ring 0
A1 - Rating
38. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Compare the security labels
Simple Integrity Axiom
B1 - Labeled Security rating
An abstract machine
39. When a computer uses more than one CPU in parallel to execute instructions is known as?
The Security Kernel
Pagefile.sys file
Multiprocessing
A1
40. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
Invocation Property
C1 - Discrection Security Protection is a type of environment
A Thread
B3 - Security Domains
41. Which Orange Book evaluation level is described as "Verified Design"?
A1
Operational assurance requirements
Indirect addressing
Trusted facility management
42. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
A1
The rule is talking about "Reading"
A security kernel
A Domain
43. Contains the ending address
B3 - Security Domains
Labels - Orange Book
Integrity
A Limit Register (Memory Management)
44. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
The security kernel
The *-Property rule (Star property)
Thrashing
A and B
45. When a vendor submits a product for evaluation - it submits it to the ____________.
Administrative declaration
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The National Computer Security Center (NCSC)
Labels - Orange Book
46. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Controls the checks
Indirect addressing
Trusted hardware - Software and Firmware
Prevent secret information from being accessed
47. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
A and B
Thrashing
D
Mandatory Access Control (MAC)
48. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Attributable data
The Red Book
Prohibits
Evaluated separately
49. When the RAM and secondary storage are combined the result is __________.
Division B - Mandatory Protection
The National Computer Security Center (NCSC)
Networks and Communications
Virtual Memory
50. Used by Windows systems to reserve the "Swap Space"
Need-to-know
Execution Domain
Pagefile.sys file
Virtual storage
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests