Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Biba Model adresses _____________________.






2. Access control labels must be associated properly with objects.






3. The C2 evaluation class of the _________________ offers controlled access protection.






4. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






5. When a portion of primary memory is accessed by specifying the actual address of the memory location






6. Audit data must be captured and protected to enforce accountability






7. All users have a clearance for and a formal need to know about - all data processed with the system.






8. The Orange book requires protection against two_____________ - which are these Timing and Storage






9. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






11. The Physical memory address that the CPU uses






12. The Availability - Integrity and confidentiality requirements of multitasking operating systems






13. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






14. Which describe a condition when RAM and Secondary storage are used together?






15. Which TCSEC level first addresses object reuse?






16. The security kernel is the mechanism that _____________ of the reference monitor concept.






17. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






18. A system uses the Reference Monitor to ___________________ of a subject and an object?






19. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






20. Which in the Orange Book ratings represents the highest level of trust?






21. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






22. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






23. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






24. Mandatory access control is enfored by the use of security labels.






25. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






26. Which is an ISO standard product evaluation criteria that supersedes several different criteria






27. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






28. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Verification Protection






30. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






31. As per FDA data should be ______________________________.






32. Involves sharing the processor amoung all ready processes






33. I/O drivers and utilities






34. A type of memory used for High-speed writing and reading activities.






35. Which uses Protection Profiles and Security Targets?






36. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






37. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






38. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






39. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






40. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






41. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






42. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






43. Mandatory Access requires that _____________ be attached to all objects.






44. Permits a database to have two records that are identical except for Their classifications






45. Trusted facility management is an assurance requirement only for ________________.






46. Execute one instruction at a time.






47. A subject at a given clearance may not read an object at a higher classification






48. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






49. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






50. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.