Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What prevents a process from accessing another process' data?






2. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






3. A system uses the Reference Monitor to ___________________ of a subject and an object?






4. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






5. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






6. The Security Model Incorporates the ____________ that should be enforced in the system.






7. The group that oversees the processes of evaluation within TCSEC is?






8. System Architecture that separates system functionality into Hierarchical layers






9. Verification Protection






10. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






11. The security kernel is the mechanism that _____________ of the reference monitor concept.






12. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






13. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






14. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






15. Contains an Address of where the instruction and dara reside that need to be processed.






16. The Physical memory address that the CPU uses






17. Used by Windows systems to reserve the "Swap Space"






18. According to the Orange Book - trusted facility management is not required for which security levels?






19. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






20. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






21. A type of memory used for High-speed writing and reading activities.






22. Each data object must contain a classification label and each subject must have a clearance label.






23. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






24. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






25. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






26. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






27. In the Bell-LaPadula Model the Subject's Label contains ___________________.






28. In the Bell-LaPadula Model the Object's Label contains ___________________.






29. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






30. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






31. Mandatory access control is enfored by the use of security labels.






32. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. Applications and user activity






34. The *-Property rule is refered to as ____________.






35. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






36. The Bell-LaPadula Model is a _______________.






37. Documentation must be provided - including test - design - and specification document - user guides and manuals






38. What model use an access control triples and requires that the system maintain separation of duty ?






39. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






40. What is called the formal acceptance of the adequacy of a system's overall security by management?






41. When a vendor submits a product for evaluation - it submits it to the ____________.






42. The Availability - Integrity and confidentiality requirements of multitasking operating systems






43. Which in the Orange Book ratings represents the highest level of trust?






44. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






45. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






46. Intended for environments that require systems to handle classified data.






47. Can be erased - modified and upgraded.






48. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






49. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






50. A subject at a given clearance may not read an object at a higher classification