SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Overt channel
Trusted Products Evaluation Program (TPEP)
The Rule is talking about writing
A Limit Register (Memory Management)
2. I/O drivers and utilities
Clark-Wilson
Ring 2
Multiprocessing
Multitasking
3. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Division B - Mandatory Protection Architecture
Execution Domain
Trusted Distribution
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
4. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
The "No write Down" Rule
Thrashing
Implement software or systems in a production environment
Ring 1
5. Which TCSEC level first addresses object reuse?
Attributable - original - accurate - contemporaneous and legible
Accountability - Orange Book
C2
Fail safe
6. The Security Model Incorporates the ____________ that should be enforced in the system.
Security Policy
A1 - Rating
Division D - Minimal Protection
Higher or equal to access class
7. A domain of trust that shares a single security policy and single management
A security domain
Isolate processes
Be protected from modification
Bell-LaPadula Model
8. Which can be used as a covert channel?
B1 - Labeled Security
Storage and timing
The Common Criteria
The National Computer Security Center (NCSC)
9. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
C2
Scalar processors
Most commonly used approach
Sensitivity labels
10. The Availability - Integrity and confidentiality requirements of multitasking operating systems
The "No read Up" rule
Protection Rings Support
Division D - Minimal Protection
Mandatory Access Control (MAC)
11. What does the simple security (ss) property mean in the Bell-LaPadula model?
Labels - Orange Book
The Tranqulity principle (The Bell-LaPadula Model)
Execution Domain
No read up
12. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Logical addresses
Virtual Memory
Security Policy - Orange Book
Polyinstantiation
13. A subject at a given clearance may not read an object at a higher classification
C2
The Simple Security Property
B2 rating
Stored in Reak Memory
14. The Indexed memory addresses that software uses
The Monolithic Operation system Architecture
Division C - Discretionary Protection
Security Policy is clearly defined and documented
Logical addresses
15. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Dedicated Security Mode
First evaluation class
Ring 1
D
16. When a computer uses more than one CPU in parallel to execute instructions is known as?
B2 - Structured Protection
Multiprocessing
Virtual Memory
The *-Property rule (Star property)
17. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
The Monolithic Operation system Architecture
Buffer (temporary data storage area)
The "No write Down" Rule
Protection Rings Support
18. The assignment of a specific individual to administer the security-related functions of a system.
Identification - Orange Book
Accountability - Orange Book
Trusted facility management
Multiprocessing
19. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
State machine model
Higher or equal to access class
A Base Register (Memory Management)
20. The Bell-LaPadula Model is a _______________.
C2
Subject to Object Model
Clark-Wilson
Orange Book - A1
21. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Orange Book ratings
The Integrity of data within applications
Certification
Secondary Storage
22. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
In C2 - Controlled Access Protection environment
A Thread
Erasable and Programmable Read-Only Memory (EPROM)
The trustworthiness of an information system
23. TCB contains The Security Kernel and all ______________.
Real storage
All Mandatory Access Control (MAC) systems
security protection mechanisms
Be protected from modification
24. The Orange book requires protection against two_____________ - which are these Timing and Storage
A security domain
Types of covert channels
Operational assurance requirements
Most commonly used approach
25. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
No write down
A Domain
Attributable - original - accurate - contemporaneous and legible
C2 - Controlled Access Protection
26. As per FDA data should be ______________________________.
B1 - Labeled Security
The Security Kernel
The *-Property rule (Star property)
Attributable - original - accurate - contemporaneous and legible
27. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
The National Computer Security Center (NCSC)
System High Security Mode
Controls the checks
Orange Book ratings
28. What is called the formal acceptance of the adequacy of a system's overall security by management?
attributability
B2 - Structured Protection
Totality of protection mechanisms
Accreditation
29. When the RAM and secondary storage are combined the result is __________.
Virtual Memory
Process isolation
A Limit Register (Memory Management)
Polyinstantiation
30. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Security rating B
Multiprocessing
C2 - Controlled Access Protection
Administrative declaration
31. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
The security kernel
Invocation Property
The security perimeter
Prevent secret information from being accessed
32. Mandatory Access requires that _____________ be attached to all objects.
An abstract machine
The National Computer Security Center (NCSC)
Sensitivity labels
'Dominate'
33. Trusted facility management is an assurance requirement only for ________________.
Security rating B
The TCSEC - Aka Orange Book
No read down
Highly secure systems (B2 - B3 and A1)
34. Which uses Protection Profiles and Security Targets?
Trusted Distribution
Implement software or systems in a production environment
State machine model
International Standard 15408
35. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Clark-Wilson
Multiprocessing
B2 rating
Ring 2
36. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Attributable - original - accurate - contemporaneous and legible
Multiprocessing
An abstract machine
Government and military applications
37. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
Execution Domain
A and B
Orange Book B
Implement software or systems in a production environment
38. Mediates all access and Functions between subjects and objects.
Sensitivity labels
Government and military applications
Continuous protection - O/B
The Security Kernel
39. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
Multilevel Security Policies
NOT Integrity
A Layered Operating System Architecure
System High Security Mode
40. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Isolate processes
The Red Book
Prevent secret information from being accessed
Basic Security Theorem (used in computer science) definition
41. Access control labels must be associated properly with objects.
Labels - Orange Book
Security rating B
Trusted hardware - Software and Firmware
Indexed addressing
42. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
The *-Property rule (Star property)
State machine model
Life-cycle assurance - O/B
B3
43. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Clark-Wilson Model
Need-to-know
The Strong star property rule
Invocation Property
44. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Isolate processes
Orange Book B
Relative Addresses
The Rule is talking about writing
45. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Operational assurance requirements
Dedicated Security Mode
B2 - Structured Protection
Mandatory access control
46. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
The Strong star property rule
C2
Administrative declaration
*-Integrity Axiom
47. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Security Policy - Orange Book
B3 - Security Domains
A lattice of Intergrity Levels
The Thread (memory Management)
48. What model use an access control triples and requires that the system maintain separation of duty ?
Physical security
Clark-Wilson
Controls the checks
Buffer overflows
49. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
B2 - Structured Protection
Accreditation
Ring 2
Division C - Discretionary Protection
50. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
Invocation Property
The Red Book
C2 - Controlled Access Protection
Thrashing