SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data in Cache can be accessed much more quickly than Data
Stored in Reak Memory
C1 - Discretionary Security Protection
A security domain
The security perimeter
2. Discretionary protection
Swap Space
Orange Book C
Orange Book A
Simple Security Rule
3. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Discretionary Security Property (ds-property)
Prevent secret information from being accessed
The National Computer Security Center (NCSC)
Physical security
4. As per FDA data should be ______________________________.
The security perimeter
B1 - Labeled Security
A1
Attributable - original - accurate - contemporaneous and legible
5. When the RAM and secondary storage are combined the result is __________.
Protection Rings Support
Simple Security Rule
Virtual Memory
The Strong star property rule
6. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Division B - Mandatory Protection Architecture
Certification
security protection mechanisms
Access control to the objects by the subjects
7. What does the simple integrity axiom mean in the Biba model?
C1 - Discrection Security Protection is a type of environment
No read down
B1 - Labeled Security rating
C1
8. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
A and B
Covert channels
A security domain
A Limit Register (Memory Management)
9. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book - A1
Buffer overflows
The Strong star property rule
Storage and timing
10. Permits a database to have two records that are identical except for Their classifications
Discretionary Security Property (ds-property)
Polyinstantiation
The Clark Wilson integrity model
Implement software or systems in a production environment
11. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
Accreditation
Continuous protection - O/B
Direct Addressing
Trusted Distribution
12. Applications and user activity
Access Matrix model
Absolute addresses
Ring 3
TCB (Trusted Computing Base)
13. Each data object must contain a classification label and each subject must have a clearance label.
Absolute addresses
B1 - Labeled Security
Certification
Orange Book C
14. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Trusted Distribution
Certification
Accountability - Orange Book
Buffer (temporary data storage area)
15. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Invocation Property
Life Cycle Assurance Requirement
Basic Security Theorem (used in computer science) definition
A Base Register (Memory Management)
16. Minimal Security
Secondary Storage
Relative Addresses
Orange Book - D
Administrative declaration
17. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Sensitivity labels
Higher or equal to access class
B3 - Security Domains
Government and military applications
18. Access control labels must be associated properly with objects.
Secondary Storage
Labels - Orange Book
Compare the security labels
Division B - Mandatory Protection
19. When the contents of the address defined in the program's instruction is added to that of an index register.
Ring 3
Indexed addressing
Virtual Memory
The trustworthiness of an information system
20. When a computer uses more than one CPU in parallel to execute instructions is known as?
B2 rating
Prohibits
Multiprocessing
Totality of protection mechanisms
21. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
C1
Clark-Wilson Model
B2 rating
Evaluated separately
22. The total combination of protection mechanisms within a computer system
Overt channel
Swap Space
Indexed addressing
TCB (Trusted Computing Base)
23. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
'Dominate'
The security perimeter
Life Cycle Assurance Requirement
B3
24. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Direct Addressing
Isolate processes
Integrity
Trusted hardware - Software and Firmware
25. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Administrative declaration
B2 rating
Security Policy is clearly defined and documented
A security domain
26. The group that oversees the processes of evaluation within TCSEC is?
Trusted Products Evaluation Program (TPEP)
Sensitivity labels
Continuous protection - O/B
Most commonly used approach
27. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
NOT Integrity
A security domain
Controls the checks
Orange Book ratings
28. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Discretionary Security Property (ds-property)
Clark-Wilson
Its Clearance Label (Top Secret - Secret - or Confidential)
Direct Addressing
29. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Covert channels
Operational assurance requirements
Enforces the rules
Controlling unauthorized downgrading of information
30. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Orange Book - B3
Integrity
The Strong star property rule
B3
31. The Simple Security rule is refered to as______________.
Orange Book A
Swap Space
Virtual Memory
The "No read Up" rule
32. Documentation must be provided - including test - design - and specification document - user guides and manuals
Documentation - Orange Book
Orange Book - B3
B2 - Structured Protection
Attributable - original - accurate - contemporaneous and legible
33. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Intended for environments that require systems to handle classified data.
B1 - Labeled Security rating
Ring 1
Integrity
Implement software or systems in a production environment
35. Which is an ISO standard product evaluation criteria that supersedes several different criteria
B2 - Structured Protection
The Common Criteria
Security Policy - Orange Book
The reference monitor
36. Which can be used as a covert channel?
Integrity
A Limit Register (Memory Management)
Orange Book - B1
Storage and timing
37. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Controls the checks
A Base Register (Memory Management)
Simple Integrity Axiom
Indexed addressing
38. Which is a straightforward approach that provides access rights to subjects for objects?
Access Matrix model
C2 - Controlled Access Protection
Ring 1
C1 - Discrection Security Protection is a type of environment
39. In the Bell-LaPadula Model the Object's Label contains ___________________.
Process isolation
Its classification label (Top Secret - Secret or confidential)
Evaluated separately
Identification - Orange Book
40. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Most commonly used approach
Prohibits
The TCSEC - Aka Orange Book
Firmware
41. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
Orange Book A
Division B - Mandatory Protection
D
Division B - Mandatory Protection Architecture
42. In access control terms - the word "dominate" refers to ___________.
Higher or equal to access class
No write down
C2 - Controlled Access Protection
Division D - Minimal Protection
43. Which increases the performance in a computer by overlapping the steps of different instructions?
Pipelining
Implement software or systems in a production environment
Examples of Layered Operating Systems
Security Policy is clearly defined and documented
44. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Trusted hardware - Software and Firmware
Access Matrix model
B1 - Labeled Security
The reference monitor
45. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
Compare the security labels
Absolute addresses
A lattice of Intergrity Levels
The *-Property rule (Star property)
46. Happen because input data is not checked for appropriate length at time of input
Buffer overflows
Direct Addressing
Labels - Orange Book
Highly secure systems (B2 - B3 and A1)
47. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
Mandatory Access Control (MAC)
The Rule is talking about writing
C1 - Discrection Security Protection is a type of environment
No write down
48. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Documentation - Orange Book
Examples of Layered Operating Systems
B2 rating
49. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Enforces the rules
The Simple Security Property
Constrained
Disclosure of residual data
50. A Policy based control. All objects and systems have a sensitivity level assigned to them
The Biba Model
A Limit Register (Memory Management)
Mandatory Access Control (MAC)
Evaluated separately