Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the address location that is specified in the program instruction contains the address of the final desired location.






2. What is called the formal acceptance of the adequacy of a system's overall security by management?






3. The C2 evaluation class of the _________________ offers controlled access protection.






4. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






5. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






6. Audit data must be captured and protected to enforce accountability






7. What prevents a process from accessing another process' data?






8. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






9. Can be erased - modified and upgraded.






10. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






11. The assignment of a specific individual to administer the security-related functions of a system.






12. When a vendor submits a product for evaluation - it submits it to the ____________.






13. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






15. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






16. The Bell-LaPadula model Subjects and Objects are ___________.






17. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






18. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






19. The Reserved hard drive space used to to extend RAM capabilites.






20. Which can be used as a covert channel?






21. Which uses Protection Profiles and Security Targets?






22. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






23. TCB contains The Security Kernel and all ______________.






24. Which is an ISO standard product evaluation criteria that supersedes several different criteria






25. Applications and user activity






26. Each data object must contain a classification label and each subject must have a clearance label.






27. The Physical memory address that the CPU uses






28. As per FDA data should be ______________________________.






29. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






30. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






31. In access control terms - the word "dominate" refers to ___________.






32. A domain of trust that shares a single security policy and single management






33. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






34. TCSEC provides a means to evaluate ______________________.






35. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






36. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






37. Which TCSEC level first addresses object reuse?






38. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






39. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






40. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






41. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






42. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






43. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






44. A subject at a given clearance may not read an object at a higher classification






45. In the Bell-LaPadula Model the Object's Label contains ___________________.






46. Mandatory access control is enfored by the use of security labels.






47. What are the components of an object's sensitivity label?






48. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






49. Data in Cache can be accessed much more quickly than Data






50. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.