Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is called the formal acceptance of the adequacy of a system's overall security by management?






2. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






3. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






4. Happen because input data is not checked for appropriate length at time of input






5. Subjects and Objects cannot change their security levels once they have been instantiated (created)






6. The TCB is the ________________ within a computer system that work together to enforce a security policy.






7. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






8. The Reserved hard drive space used to to extend RAM capabilites.






9. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






10. What does the simple security (ss) property mean in the Bell-LaPadula model?






11. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






12. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






13. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






14. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






15. Intended for environments that require systems to handle classified data.






16. Can be erased - modified and upgraded.






17. A type of memory used for High-speed writing and reading activities.






18. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






19. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






20. The Orange book does NOT Cover ________________ - And Database management systems






21. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






22. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






23. Verification Protection






24. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






25. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






26. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






27. When the contents of the address defined in the program's instruction is added to that of an index register.






28. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






29. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






30. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






31. Another word for Primary storage and distinguishes physical memory from virtual memory.






32. A set of objects that a subject is able to access






33. All users have a clearance for and a formal need to know about - all data processed with the system.






34. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






35. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






36. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






37. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






38. When a portion of primary memory is accessed by specifying the actual address of the memory location






39. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






40. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. Mandatory access control is enfored by the use of security labels.






42. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






43. In access control terms - the word "dominate" refers to ___________.






44. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






45. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






46. Contains the ending address






47. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






48. Which can be used as a covert channel?






49. In the Bell-LaPadula Model the Subject's Label contains ___________________.






50. Contains the beginning address