Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. The Policy must be explicit and well defined and enforced by the mechanisms within the system






3. I/O drivers and utilities






4. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






5. Bell-LaPadula model was proposed for enforcing access control in _____________________.






6. A Policy based control. All objects and systems have a sensitivity level assigned to them






7. Based on a known address with an offset value applied.






8. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






9. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






10. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






11. TCB contains The Security Kernel and all ______________.






12. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






13. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






14. Contains an Address of where the instruction and dara reside that need to be processed.






15. The Bell-LaPadula Model is a _______________.






16. A system uses the Reference Monitor to ___________________ of a subject and an object?






17. Verification Protection






18. Subjects and Objects cannot change their security levels once they have been instantiated (created)






19. The security kernel is the mechanism that _____________ of the reference monitor concept.






20. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






21. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






22. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






23. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






24. According to the Orange Book - trusted facility management is not required for which security levels?






25. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






26. TCSEC provides a means to evaluate ______________________.






27. The C2 evaluation class of the _________________ offers controlled access protection.






28. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






29. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






30. Simpler instructions that require fewer clock cycles to execute.






31. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






32. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






33. The TCB is the ________________ within a computer system that work together to enforce a security policy.






34. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






35. When the RAM and secondary storage are combined the result is __________.






36. Mandatory Access requires that _____________ be attached to all objects.






37. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






38. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






39. Which is a straightforward approach that provides access rights to subjects for objects?






40. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






41. Discretionary protection






42. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






43. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






44. Trusted facility management is an assurance requirement only for ________________.






45. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






46. A domain of trust that shares a single security policy and single management






47. Can be erased - modified and upgraded.






48. Users need to be Identified individually to provide more precise acces control and auditing functionality.






49. Operating System Kernel






50. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle