Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Availability - Integrity and confidentiality requirements of multitasking operating systems






2. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






3. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






4. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






5. Individual subjects must be uniquely identified.






6. Which TCSEC level first addresses object reuse?






7. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






8. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






9. The security kernel is the mechanism that _____________ of the reference monitor concept.






10. The Orange book does NOT Cover ________________ - And Database management systems






11. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






12. Based on a known address with an offset value applied.






13. Which is a straightforward approach that provides access rights to subjects for objects?






14. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






15. What are the components of an object's sensitivity label?






16. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






17. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






18. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. The Policy must be explicit and well defined and enforced by the mechanisms within the system






20. Each data object must contain a classification label and each subject must have a clearance label.






21. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






22. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






23. Which is an ISO standard product evaluation criteria that supersedes several different criteria






24. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






25. Involves sharing the processor amoung all ready processes






26. In the Bell-LaPadula Model the Object's Label contains ___________________.






27. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






28. In access control terms - the word "dominate" refers to ___________.






29. The TCB is the ________________ within a computer system that work together to enforce a security policy.






30. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






31. What prevents a process from accessing another process' data?






32. The Reserved hard drive space used to to extend RAM capabilites.






33. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






34. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






35. Verification Protection






36. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






37. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






38. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






39. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






40. Simpler instructions that require fewer clock cycles to execute.






41. Which would be designated as objects on a MAC system?






42. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






43. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






44. What model use an access control triples and requires that the system maintain separation of duty ?






45. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






46. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






47. A system uses the Reference Monitor to ___________________ of a subject and an object?






48. Execute one instruction at a time.






49. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






50. The Physical memory address that the CPU uses