Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating System Kernel






2. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






3. The Bell-LaPadula Model is a _______________.






4. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






5. The TCB is the ________________ within a computer system that work together to enforce a security policy.






6. Individual subjects must be uniquely identified.






7. TCSEC provides a means to evaluate ______________________.






8. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






9. A system uses the Reference Monitor to ___________________ of a subject and an object?






10. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






11. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






12. The Physical memory address that the CPU uses






13. Execute one instruction at a time.






14. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






15. Which is a straightforward approach that provides access rights to subjects for objects?






16. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






17. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






18. A domain of trust that shares a single security policy and single management






19. Which increases the performance in a computer by overlapping the steps of different instructions?






20. The Reserved hard drive space used to to extend RAM capabilites.






21. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






22. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






23. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






24. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






25. The Biba Model adresses _____________________.






26. What access control technique is also known as multilevel security?






27. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






28. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






29. Which TCSEC level first addresses object reuse?






30. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






31. Which uses Protection Profiles and Security Targets?






32. TCB contains The Security Kernel and all ______________.






33. Which in the Orange Book ratings represents the highest level of trust?






34. What does the Clark-Wilson security model focus on






35. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






36. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






37. The Availability - Integrity and confidentiality requirements of multitasking operating systems






38. The Policy must be explicit and well defined and enforced by the mechanisms within the system






39. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






40. When a vendor submits a product for evaluation - it submits it to the ____________.






41. Permits a database to have two records that are identical except for Their classifications






42. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






43. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






44. A subject at a given clearance may not read an object at a higher classification






45. When a portion of primary memory is accessed by specifying the actual address of the memory location






46. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






47. The Orange book does NOT Cover ________________ - And Database management systems






48. Another word for Primary storage and distinguishes physical memory from virtual memory.






49. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






50. Mediates all access and Functions between subjects and objects.