Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which Orange Book evaluation level is described as "Verified Design"?






2. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






3. A Policy based control. All objects and systems have a sensitivity level assigned to them






4. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






5. Permits a database to have two records that are identical except for Their classifications






6. Which describe a condition when RAM and Secondary storage are used together?






7. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






8. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






9. When a vendor submits a product for evaluation - it submits it to the ____________.






10. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






11. What are the components of an object's sensitivity label?






12. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






13. Which uses Protection Profiles and Security Targets?






14. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






15. The Orange book requires protection against two_____________ - which are these Timing and Storage






16. When the contents of the address defined in the program's instruction is added to that of an index register.






17. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






18. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






19. Each data object must contain a classification label and each subject must have a clearance label.






20. TCB contains The Security Kernel and all ______________.






21. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






22. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






23. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






24. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






25. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






26. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






27. Contains the beginning address






28. The Policy must be explicit and well defined and enforced by the mechanisms within the system






29. What access control technique is also known as multilevel security?






30. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






31. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






32. Remaining parts of the operating system






33. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






34. Mandatory Protection






35. Succesfully Evaluated products are placed on?






36. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






37. In access control terms - the word "dominate" refers to ___________.






38. The *-Property rule is refered to as ____________.






39. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






40. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






41. Data in Cache can be accessed much more quickly than Data






42. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






43. The Bell-LaPadula model Subjects and Objects are ___________.






44. The Biba Model adresses _____________________.






45. The Availability - Integrity and confidentiality requirements of multitasking operating systems






46. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






47. Minimal Security






48. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






49. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






50. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests