Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






2. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






3. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






4. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






5. Discretionary protection






6. Data in Cache can be accessed much more quickly than Data






7. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






8. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






9. Audit data must be captured and protected to enforce accountability






10. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






11. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






12. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






13. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






14. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






15. Which can be used as a covert channel?






16. Which is an ISO standard product evaluation criteria that supersedes several different criteria






17. System Architecture that separates system functionality into Hierarchical layers






18. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






19. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






20. Contains an Address of where the instruction and dara reside that need to be processed.






21. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






22. Users need to be Identified individually to provide more precise acces control and auditing functionality.






23. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






24. The Security Model Incorporates the ____________ that should be enforced in the system.






25. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






26. Each data object must contain a classification label and each subject must have a clearance label.






27. Contains the ending address






28. Minimal Security






29. The subject must have Need to Know for ONLY the information they are trying to access.






30. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






31. According to the Orange Book - trusted facility management is not required for which security levels?






32. Subjects and Objects cannot change their security levels once they have been instantiated (created)






33. Permits a database to have two records that are identical except for Their classifications






34. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






35. When the address location that is specified in the program instruction contains the address of the final desired location.






36. When a portion of primary memory is accessed by specifying the actual address of the memory location






37. Should always trace to individuals responsible for observing and recording the data






38. A domain of trust that shares a single security policy and single management






39. Bell-LaPadula model was proposed for enforcing access control in _____________________.






40. The combination of RAM - Cache and the Processor Registers






41. What does the Clark-Wilson security model focus on






42. The *-Property rule is refered to as ____________.






43. Operating System Kernel






44. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






45. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






46. Happen because input data is not checked for appropriate length at time of input






47. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






48. Contains the beginning address






49. The C2 evaluation class of the _________________ offers controlled access protection.






50. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.