Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Individual subjects must be uniquely identified.






2. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. A set of objects that a subject is able to access






4. The Orange book requires protection against two_____________ - which are these Timing and Storage






5. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






6. Execute one instruction at a time.






7. Data in Cache can be accessed much more quickly than Data






8. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






9. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






10. What does the simple security (ss) property mean in the Bell-LaPadula model?






11. Which would be designated as objects on a MAC system?






12. Which is a straightforward approach that provides access rights to subjects for objects?






13. Mandatory Access requires that _____________ be attached to all objects.






14. The Availability - Integrity and confidentiality requirements of multitasking operating systems






15. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






16. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






17. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






18. A Policy based control. All objects and systems have a sensitivity level assigned to them






19. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






20. When a portion of primary memory is accessed by specifying the actual address of the memory location






21. When a computer uses more than one CPU in parallel to execute instructions is known as?






22. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






23. What prevents a process from accessing another process' data?






24. What access control technique is also known as multilevel security?






25. When the RAM and secondary storage are combined the result is __________.






26. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






27. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






28. Trusted facility management is an assurance requirement only for ________________.






29. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






30. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






31. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






32. Minimal Security






33. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






34. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






35. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






36. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






37. What does the simple integrity axiom mean in the Biba model?






38. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






39. The Reserved hard drive space used to to extend RAM capabilites.






40. Which can be used as a covert channel?






41. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






42. What are the components of an object's sensitivity label?






43. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






44. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






45. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






46. Happen because input data is not checked for appropriate length at time of input






47. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






48. What does the * (star) property mean in the Bell-LaPadula model?






49. When the address location that is specified in the program instruction contains the address of the final desired location.






50. Contains an Address of where the instruction and dara reside that need to be processed.