SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
The reference monitor
B3
Division D - Minimal Protection
Highly secure systems (B2 - B3 and A1)
2. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
The Common Criteria
Absolute addresses
Evaluated separately
Security mechanisms and evalautes their effectivenes
3. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
Fail safe
Isolate processes
A Thread
The Common Criteria
4. What are the components of an object's sensitivity label?
A single classification and a Compartment Set
B1 - Labeled Security
Continuous protection - O/B
The trustworthiness of an information system
5. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Be protected from modification
Division C - Discretionary Protection
A and B
B2 - Structured Protection
6. The Simple Security rule is refered to as______________.
Models concerned with integrity
D
The "No read Up" rule
Disclosure of residual data
7. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Scalar processors
A Thread
The security kernel
B2 - Structured Protection
8. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
Thrashing
Integrity
Dominate the object's sensitivity label
The Biba Model
9. Mediates all access and Functions between subjects and objects.
The Security Kernel
Buffer (temporary data storage area)
Complex Instruction Set Computers (CISC)
Be protected from modification
10. A system uses the Reference Monitor to ___________________ of a subject and an object?
Continuous protection - O/B
The TCSEC - Aka Orange Book
Compare the security labels
Controls the checks
11. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Orange Book - B3
security protection mechanisms
Firmware
Invocation Property
12. When the RAM and secondary storage are combined the result is __________.
The *-Property rule (Star property)
Clark-Wilson Model
Virtual Memory
C1
13. Individual subjects must be uniquely identified.
Prevent secret information from being accessed
Security Policy
*-Integrity Axiom
Identification - Orange Book
14. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Examples of Layered Operating Systems
First evaluation class
Accountability - Orange Book
Administrative declaration
15. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Clark-Wilson
Trusted Distribution
Accountability - Orange Book
A security kernel
16. The Orange book requires protection against two_____________ - which are these Timing and Storage
Disclosure of residual data
security protection mechanisms
Its Clearance Label (Top Secret - Secret - or Confidential)
Types of covert channels
17. Users need to be Identified individually to provide more precise acces control and auditing functionality.
C2 - Controlled Access Protection
State machine model
Ring 3
Orange Book B
18. TCB contains The Security Kernel and all ______________.
Ring 3
security protection mechanisms
The Monolithic Operation system Architecture
The *-Property rule (Star property)
19. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
B3 - Security Domains
Orange Book interpretations
B3 - Rating
Indexed addressing
20. What does the simple integrity axiom mean in the Biba model?
Accreditation
Orange Book B
The Security Kernel
No read down
21. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
No read up
D
The Clark Wilson integrity model
Programmable Read-Only Memory (PROM)
22. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Division B - Mandatory Protection Architecture
State machine model
Security rating B
Storage and timing
23. The Availability - Integrity and confidentiality requirements of multitasking operating systems
Protection Rings Support
The security perimeter
Labels - Orange Book
B2
24. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
The *-Property rule (Star property)
Mandatory access control
Reduced Instruction Set Computers (RISC)
25. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Execution Domain
A Base Register (Memory Management)
The trustworthiness of an information system
Accreditation
26. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
Enforces the rules
Relative Addresses
The security perimeter
attributability
27. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Life-cycle assurance - O/B
Multitasking
Ring 3
TCB (Trusted Computing Base)
28. What model use an access control triples and requires that the system maintain separation of duty ?
Clark-Wilson
Indirect addressing
Virtual Memory
Orange Book interpretations
29. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
A single classification and a Compartment Set
C1
Need-to-know
Trusted hardware - Software and Firmware
30. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Virtual Memory
Multilevel Security Policies
Covert channels
Primary storage
31. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
No read down
Secondary Storage
Bell-LaPadula Model
Cache Memory
32. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The Trusted Computing Base (TCB)
The "No read Up" rule
The Strong star property rule
In C2 - Controlled Access Protection environment
33. The Bell-LaPadula Model is a _______________.
Subject to Object Model
The Security Kernel
An abstract machine
Firmware
34. Which describe a condition when RAM and Secondary storage are used together?
Virtual storage
C2 - Controlled Access Protection
Erasable and Programmable Read-Only Memory (EPROM)
Division C - Discretionary Protection
35. Applications and user activity
Invocation Property
Discretionary Security Property (ds-property)
Stored in Reak Memory
Ring 3
36. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Basic Security Theorem (used in computer science) definition
A1 - Rating
Security Policy
The TCSEC - Aka Orange Book
37. Permits a database to have two records that are identical except for Their classifications
The Security Kernel
Documentation - Orange Book
The Common Criteria
Polyinstantiation
38. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Scalar processors
Implement software or systems in a production environment
Swap Space
The *-Property rule (Star property)
39. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
C2 - Controlled Access Protection
Models concerned with integrity
Simple Integrity Axiom
Enforces the rules
40. Operating System Kernel
Ring 0
Higher or equal to access class
The security perimeter
Attributable data
41. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Basic Security Theorem (used in computer science) definition
Trusted Network Interpretation (TNI)
Secondary Storage
An abstract machine
42. Documentation must be provided - including test - design - and specification document - user guides and manuals
Labels - Orange Book
Its Clearance Label (Top Secret - Secret - or Confidential)
No read down
Documentation - Orange Book
43. Can be erased - modified and upgraded.
Constrained
All Mandatory Access Control (MAC) systems
Erasable and Programmable Read-Only Memory (EPROM)
TCB (Trusted Computing Base)
44. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Orange Book interpretations
Division D - Minimal Protection
attributability
A security kernel
45. Happen because input data is not checked for appropriate length at time of input
Storage and timing
Buffer overflows
Mandatory access control
Sensitivity labels
46. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Thrashing
No read up
Networks and Communications
Clark-Wilson Model
47. The Security Model Incorporates the ____________ that should be enforced in the system.
The Thread (memory Management)
Storage and timing
Security Policy
Sensitivity labels
48. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
The Rule is talking about writing
No write down
Controls the checks
Constrained
49. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
B3 - Security Domains
Security Policy is clearly defined and documented
TCB (Trusted Computing Base)
Direct Addressing
50. Which can be used as a covert channel?
A and B
The Evaluated Products List (EPL) with their corresponding rating
Dominate the object's sensitivity label
Storage and timing
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests