SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Virtual storage
Orange Book - A1
Accountability - Orange Book
The Security Kernel
2. Which describe a condition when RAM and Secondary storage are used together?
The rule is talking about "Reading"
A security kernel
Polyinstantiation
Virtual storage
3. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Subject to Object Model
In C2 - Controlled Access Protection environment
The security perimeter
Government and military applications
4. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Division B - Mandatory Protection
A security kernel
Multilevel Security Policies
Invocation Property
5. The C2 evaluation class of the _________________ offers controlled access protection.
Compare the security labels
Access Matrix model
Trusted Network Interpretation (TNI)
Examples of Layered Operating Systems
6. The Bell-LaPadula Model is a _______________.
Subject to Object Model
Continuous protection - O/B
Ring 2
International Standard 15408
7. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
B2 rating
Basic Security Theorem (used in computer science) definition
The Tranqulity principle (The Bell-LaPadula Model)
NOT Integrity
8. When the contents of the address defined in the program's instruction is added to that of an index register.
Indexed addressing
C2 - Controlled Access Protection
Thrashing
Need-to-know
9. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
The rule is talking about "Reading"
Certification
Its Clearance Label (Top Secret - Secret - or Confidential)
Be protected from modification
10. Involves sharing the processor amoung all ready processes
Multitasking
Multilevel Security Policies
Dominate the object's sensitivity label
Multiprocessing
11. Trusted facility management is an assurance requirement only for ________________.
The National Computer Security Center (NCSC)
A Limit Register (Memory Management)
Highly secure systems (B2 - B3 and A1)
Access Matrix model
12. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Security rating B
No read up
Multilevel Security Policies
Programmable Read-Only Memory (PROM)
13. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
D
The "No read Up" rule
Complex Instruction Set Computers (CISC)
Sensitivity labels
14. What access control technique is also known as multilevel security?
The "No read Up" rule
C1 - Discrection Security Protection is a type of environment
Mandatory Access Control (MAC)
Mandatory access control
15. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Integrity
Trusted Distribution
B2 - Structured Protection
System High Security Mode
16. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Indirect addressing
Totality of protection mechanisms
Documentation - Orange Book
B3
17. The Reserved hard drive space used to to extend RAM capabilites.
The security perimeter
Government and military applications
Swap Space
C2
18. Which increases the performance in a computer by overlapping the steps of different instructions?
Need-to-know
Relative Addresses
All Mandatory Access Control (MAC) systems
Pipelining
19. When a portion of primary memory is accessed by specifying the actual address of the memory location
Process isolation
Simple Integrity Axiom
The Common Criteria
Direct addressing
20. Which can be used as a covert channel?
A Domain
Trusted Distribution
Storage and timing
The Biba Model
21. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Its Clearance Label (Top Secret - Secret - or Confidential)
International Standard 15408
First evaluation class
The Integrity of data within applications
22. The Simple Security rule is refered to as______________.
Ring 3
The "No read Up" rule
The National Computer Security Center (NCSC)
Simple Security Rule
23. The security kernel is the mechanism that _____________ of the reference monitor concept.
Process isolation
International Standard 15408
Enforces the rules
Models concerned with integrity
24. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The "No write Down" Rule
The reference monitor
'Dominate'
Orange Book A
25. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
Security Policy
All Mandatory Access Control (MAC) systems
Evaluated separately
A security kernel
26. Simpler instructions that require fewer clock cycles to execute.
Constrained
Orange Book B
Reduced Instruction Set Computers (RISC)
Multilevel Security Policies
27. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
Clark-Wilson
B2
Its classification label (Top Secret - Secret or confidential)
The Rule is talking about writing
28. As per FDA data should be ______________________________.
Attributable - original - accurate - contemporaneous and legible
Mandatory Access Control (MAC)
A Domain
Be protected from modification
29. Access control labels must be associated properly with objects.
Security Policy - Orange Book
Orange Book interpretations
Labels - Orange Book
Security Policy
30. The Biba Model adresses _____________________.
C1 - Discretionary Security Protection
Stored in Reak Memory
C2 - Controlled Access Protection
The Integrity of data within applications
31. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
The National Computer Security Center (NCSC)
Networks and Communications
Direct addressing
Physical security
32. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Programmable Read-Only Memory (PROM)
Orange Book interpretations
B2
The trustworthiness of an information system
33. What prevents a process from accessing another process' data?
Virtual storage
Continuous protection - O/B
Identification - Orange Book
Process isolation
34. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
Labels - Orange Book
Sensitivity labels
Be protected from modification
Direct Addressing
35. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
Relative Addresses
The TCSEC - Aka Orange Book
NOT Integrity
attributability
36. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
B2
The Strong star property rule
Physical security
Overt channel
37. The Orange book does NOT Cover ________________ - And Database management systems
Division B - Mandatory Protection
Networks and Communications
Buffer (temporary data storage area)
Government and military applications
38. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Indexed addressing
The Thread (memory Management)
Continuous protection - O/B
Orange Book C
39. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Examples of Layered Operating Systems
Swap Space
Evaluated separately
Stored in Reak Memory
40. Remaining parts of the operating system
Ring 1
Execution Domain
B2 - Structured Protection
Orange Book B
41. The *-Property rule is refered to as ____________.
Ring 1
Controls the checks
The Common Criteria
The "No write Down" Rule
42. Verification Protection
Highly secure systems (B2 - B3 and A1)
Complex Instruction Set Computers (CISC)
Orange Book A
The rule is talking about "Reading"
43. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Swap Space
Government and military applications
Examples of Layered Operating Systems
Covert channels
44. The group that oversees the processes of evaluation within TCSEC is?
Trusted Products Evaluation Program (TPEP)
The Trusted Computing Base (TCB)
Direct addressing
Reduced Instruction Set Computers (RISC)
45. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
The *-Property rule (Star property)
Relative Addresses
Multilevel Security Policies
C2 - Controlled Access Protection
46. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Access Matrix model
Secondary Storage
Prevent secret information from being accessed
The Common Criteria
47. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Pipelining
Bell-LaPadula Model
Division B - Mandatory Protection
Security Policy is clearly defined and documented
48. What does the simple integrity axiom mean in the Biba model?
No read down
The Rule is talking about writing
Indexed addressing
Higher or equal to access class
49. The total combination of protection mechanisms within a computer system
Labels - Orange Book
Attributable - original - accurate - contemporaneous and legible
Execution Domain
TCB (Trusted Computing Base)
50. Succesfully Evaluated products are placed on?
B1 - Labeled Security
The *-Property rule (Star property)
The Evaluated Products List (EPL) with their corresponding rating
C2 - Controlled Access Protection