Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






2. When a computer uses more than one CPU in parallel to execute instructions is known as?






3. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






4. TCSEC provides a means to evaluate ______________________.






5. Simpler instructions that require fewer clock cycles to execute.






6. Execute one instruction at a time.






7. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






8. When the address location that is specified in the program instruction contains the address of the final desired location.






9. Individual subjects must be uniquely identified.






10. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






11. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






12. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






13. Contains an Address of where the instruction and dara reside that need to be processed.






14. What is called the formal acceptance of the adequacy of a system's overall security by management?






15. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






16. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






17. The combination of RAM - Cache and the Processor Registers






18. The group that oversees the processes of evaluation within TCSEC is?






19. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






20. I/O drivers and utilities






21. The *-Property rule is refered to as ____________.






22. The security kernel is the mechanism that _____________ of the reference monitor concept.






23. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






24. Can be erased - modified and upgraded.






25. In the Bell-LaPadula Model the Object's Label contains ___________________.






26. Each data object must contain a classification label and each subject must have a clearance label.






27. The Physical memory address that the CPU uses






28. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






29. Subjects and Objects cannot change their security levels once they have been instantiated (created)






30. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






31. A system uses the Reference Monitor to ___________________ of a subject and an object?






32. Contains the ending address






33. The total combination of protection mechanisms within a computer system






34. Which describe a condition when RAM and Secondary storage are used together?






35. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






36. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






37. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






38. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






39. A type of memory used for High-speed writing and reading activities.






40. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






41. Discretionary protection






42. What does the simple security (ss) property mean in the Bell-LaPadula model?






43. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






44. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






45. The Orange book requires protection against two_____________ - which are these Timing and Storage






46. In the Bell-LaPadula Model the Subject's Label contains ___________________.






47. Mediates all access and Functions between subjects and objects.






48. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






49. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






50. As per FDA data should be ______________________________.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests