Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As per FDA data should be ______________________________.






2. When a computer uses more than one CPU in parallel to execute instructions is known as?






3. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






4. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






5. Access control labels must be associated properly with objects.






6. What is called the formal acceptance of the adequacy of a system's overall security by management?






7. Mediates all access and Functions between subjects and objects.






8. Which TCSEC level first addresses object reuse?






9. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






10. The Orange book does NOT Cover ________________ - And Database management systems






11. Audit data must be captured and protected to enforce accountability






12. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






13. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






14. All users have a clearance for and a formal need to know about - all data processed with the system.






15. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






16. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






17. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






18. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






19. What does the * (star) property mean in the Bell-LaPadula model?






20. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






21. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. The combination of RAM - Cache and the Processor Registers






23. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






24. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






25. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






26. What does the simple security (ss) property mean in the Bell-LaPadula model?






27. What does the Clark-Wilson security model focus on






28. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






29. A domain of trust that shares a single security policy and single management






30. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






31. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






32. According to the Orange Book - trusted facility management is not required for which security levels?






33. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






34. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






35. Which is an ISO standard product evaluation criteria that supersedes several different criteria






36. I/O drivers and utilities






37. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






38. What prevents a process from accessing another process' data?






39. TCB contains The Security Kernel and all ______________.






40. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






41. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






42. The Bell-LaPadula Model is a _______________.






43. Succesfully Evaluated products are placed on?






44. Remaining parts of the operating system






45. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






46. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






47. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






48. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






49. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






50. Which can be used as a covert channel?