Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The combination of RAM - Cache and the Processor Registers






2. Documentation must be provided - including test - design - and specification document - user guides and manuals






3. Users need to be Identified individually to provide more precise acces control and auditing functionality.






4. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






5. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






6. Happen because input data is not checked for appropriate length at time of input






7. What model use an access control triples and requires that the system maintain separation of duty ?






8. The security kernel is the mechanism that _____________ of the reference monitor concept.






9. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






10. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






11. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






12. Which Orange Book evaluation level is described as "Verified Design"?






13. A set of objects that a subject is able to access






14. A type of memory used for High-speed writing and reading activities.






15. When a vendor submits a product for evaluation - it submits it to the ____________.






16. What does the simple security (ss) property mean in the Bell-LaPadula model?






17. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






18. The Policy must be explicit and well defined and enforced by the mechanisms within the system






19. When the RAM and secondary storage are combined the result is __________.






20. The TCB is the ________________ within a computer system that work together to enforce a security policy.






21. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






22. Contains the ending address






23. A system uses the Reference Monitor to ___________________ of a subject and an object?






24. The Biba Model adresses _____________________.






25. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






26. Another word for Primary storage and distinguishes physical memory from virtual memory.






27. The Orange book requires protection against two_____________ - which are these Timing and Storage






28. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






29. Should always trace to individuals responsible for observing and recording the data






30. The Physical memory address that the CPU uses






31. All users have a clearance for and a formal need to know about - all data processed with the system.






32. Discretionary protection






33. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






34. Audit data must be captured and protected to enforce accountability






35. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. System Architecture that separates system functionality into Hierarchical layers






37. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






38. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






39. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






40. Succesfully Evaluated products are placed on?






41. The Bell-LaPadula model Subjects and Objects are ___________.






42. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






43. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






44. The Security Model Incorporates the ____________ that should be enforced in the system.






45. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






46. What prevents a process from accessing another process' data?






47. Mediates all access and Functions between subjects and objects.






48. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






49. Simpler instructions that require fewer clock cycles to execute.






50. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle