Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






2. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






3. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






4. When the contents of the address defined in the program's instruction is added to that of an index register.






5. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






6. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






7. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






8. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






9. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






10. What does the Clark-Wilson security model focus on






11. Permits a database to have two records that are identical except for Their classifications






12. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






13. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






14. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






15. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






16. Which is an ISO standard product evaluation criteria that supersedes several different criteria






17. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






18. Another word for Primary storage and distinguishes physical memory from virtual memory.






19. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






20. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






21. Mandatory Protection






22. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






23. Should always trace to individuals responsible for observing and recording the data






24. Individual subjects must be uniquely identified.






25. The Biba Model adresses _____________________.






26. What prevents a process from accessing another process' data?






27. Mandatory Access requires that _____________ be attached to all objects.






28. The Orange book does NOT Cover ________________ - And Database management systems






29. The Physical memory address that the CPU uses






30. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






31. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






32. Can be erased - modified and upgraded.






33. The Security Model Incorporates the ____________ that should be enforced in the system.






34. The security kernel is the mechanism that _____________ of the reference monitor concept.






35. Contains an Address of where the instruction and dara reside that need to be processed.






36. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






37. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






38. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






39. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






40. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






41. Which would be designated as objects on a MAC system?






42. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






43. Users need to be Identified individually to provide more precise acces control and auditing functionality.






44. Used by Windows systems to reserve the "Swap Space"






45. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






46. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






47. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






48. When the address location that is specified in the program instruction contains the address of the final desired location.






49. The combination of RAM - Cache and the Processor Registers






50. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.