SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
A single classification and a Compartment Set
A1 - Rating
The rule is talking about "Reading"
Simple Security Rule
2. Can be erased - modified and upgraded.
Erasable and Programmable Read-Only Memory (EPROM)
A single classification and a Compartment Set
The Thread (memory Management)
A security kernel
3. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Documentation - Orange Book
Clark-Wilson
Dedicated Security Mode
Compare the security labels
4. The Indexed memory addresses that software uses
Be protected from modification
Logical addresses
B3 - Rating
Assigned labels
5. Mandatory access control is enfored by the use of security labels.
Controlling unauthorized downgrading of information
Division B - Mandatory Protection
Overt channel
Covert channels
6. The C2 evaluation class of the _________________ offers controlled access protection.
Orange Book interpretations
State machine model
Trusted Network Interpretation (TNI)
Indexed addressing
7. A subject at a given clearance may not read an object at a higher classification
The Simple Security Property
No read up
Sensitivity labels
The Strong star property rule
8. Which TCSEC level first addresses object reuse?
C2
Process isolation
Polyinstantiation
A lattice of Intergrity Levels
9. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
Multitasking
The Tranqulity principle (The Bell-LaPadula Model)
Logical addresses
B3 - Rating
10. Another word for Primary storage and distinguishes physical memory from virtual memory.
Ring 0
Polyinstantiation
Real storage
Assigned labels
11. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
'Dominate'
Secondary Storage
Continuous protection - O/B
Covert channels
12. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Operational assurance requirements
Indexed addressing
Sensitivity labels
Security rating B
13. The *-Property rule is refered to as ____________.
No read up
The "No write Down" Rule
Types of covert channels
Ring 0
14. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Life Cycle Assurance Requirement
A and B
Buffer (temporary data storage area)
Complex Instruction Set Computers (CISC)
15. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Access control to the objects by the subjects
Orange Book interpretations
Indexed addressing
A and B
16. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Division D - Minimal Protection
Indexed addressing
Clark-Wilson
Disclosure of residual data
17. Verification Protection
B3
Orange Book - A1
Orange Book A
An abstract machine
18. Contains an Address of where the instruction and dara reside that need to be processed.
Buffer overflows
The Thread (memory Management)
Physical security
Division B - Mandatory Protection
19. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Its Clearance Label (Top Secret - Secret - or Confidential)
Discretionary Security Property (ds-property)
Most commonly used approach
NOT Integrity
20. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Fail safe
The Common Criteria
Disclosure of residual data
Examples of Layered Operating Systems
21. In the Bell-LaPadula Model the Subject's Label contains ___________________.
NOT Integrity
Disclosure of residual data
Its Clearance Label (Top Secret - Secret - or Confidential)
Direct addressing
22. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
The rule is talking about "Reading"
Controls the checks
security protection mechanisms
Clark-Wilson Model
23. Which describe a condition when RAM and Secondary storage are used together?
A1
Virtual storage
The Biba Model
Covert channels
24. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Protection Rings Support
B3 - Security Domains
Thrashing
Accountability - Orange Book
25. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
TCB (Trusted Computing Base)
D
Physical security
Ring 2
26. The Bell-LaPadula Model is a _______________.
Subject to Object Model
Orange Book interpretations
Scalar processors
An abstract machine
27. A domain of trust that shares a single security policy and single management
A security domain
The security perimeter
All Mandatory Access Control (MAC) systems
Administrative declaration
28. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Security mechanisms and evalautes their effectivenes
B3 - Rating
Division B - Mandatory Protection Architecture
Ring 3
29. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Storage and timing
B2 rating
Security Policy is clearly defined and documented
A single classification and a Compartment Set
30. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Life Cycle Assurance Requirement
Files - directories and devices
Constrained
B2 - Structured Protection
31. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
Execution Domain
security protection mechanisms
The Tranqulity principle (The Bell-LaPadula Model)
C2 - Controlled Access Protection
32. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
Controlling unauthorized downgrading of information
The Thread (memory Management)
D
C2 - Controlled Access Protection
33. Which can be used as a covert channel?
Orange Book B
State machine model
Accountability - Orange Book
Storage and timing
34. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
Security rating B
The reference monitor
Subject to Object Model
B3 - Rating
35. The Physical memory address that the CPU uses
Absolute addresses
Dedicated Security Mode
The Biba Model
Trusted Distribution
36. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
The Strong star property rule
C1
B1 - Labeled Security rating
The National Computer Security Center (NCSC)
37. All users have a clearance for and a formal need to know about - all data processed with the system.
Attributable - original - accurate - contemporaneous and legible
A Limit Register (Memory Management)
Dedicated Security Mode
Government and military applications
38. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Security Policy - Orange Book
Trusted facility management
Division C - Discretionary Protection
The Common Criteria
39. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Mandatory Access Control (MAC)
Access Matrix model
Disclosure of residual data
Orange Book ratings
40. Execute one instruction at a time.
The security kernel
Sensitivity labels
The trustworthiness of an information system
Scalar processors
41. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
The Monolithic Operation system Architecture
Constrained
Orange Book ratings
Fail safe
42. What does the Clark-Wilson security model focus on
Dominate the object's sensitivity label
Integrity
Orange Book C
Orange Book interpretations
43. Simpler instructions that require fewer clock cycles to execute.
The trustworthiness of an information system
Ring 0
Examples of Layered Operating Systems
Reduced Instruction Set Computers (RISC)
44. The Bell-LaPadula model Subjects and Objects are ___________.
Integrity
Assigned labels
Clark-Wilson Model
Clark-Wilson
45. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
The TCSEC - Aka Orange Book
Mandatory access control
An abstract machine
B3
46. What are the components of an object's sensitivity label?
A single classification and a Compartment Set
The Thread (memory Management)
Examples of Layered Operating Systems
Controls the checks
47. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Prohibits
Dominate the object's sensitivity label
Labels - Orange Book
Examples of Layered Operating Systems
48. The total combination of protection mechanisms within a computer system
Multitasking
Division B - Mandatory Protection Architecture
TCB (Trusted Computing Base)
C2 - Controlled Access Protection
49. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
Polyinstantiation
Orange Book - B3
No read up
Compare the security labels
50. A Policy based control. All objects and systems have a sensitivity level assigned to them
Mandatory Access Control (MAC)
B1 - Labeled Security rating
Orange Book - B2
Labels - Orange Book
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests