Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






2. Contains the beginning address






3. The *-Property rule is refered to as ____________.






4. When the contents of the address defined in the program's instruction is added to that of an index register.






5. The Reserved hard drive space used to to extend RAM capabilites.






6. The total combination of protection mechanisms within a computer system






7. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






8. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






9. Which is a straightforward approach that provides access rights to subjects for objects?






10. In access control terms - the word "dominate" refers to ___________.






11. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






12. TCSEC provides a means to evaluate ______________________.






13. Can be erased - modified and upgraded.






14. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






15. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






16. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






17. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






18. Mandatory Access requires that _____________ be attached to all objects.






19. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






20. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






21. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






22. The Bell-LaPadula model Subjects and Objects are ___________.






23. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






24. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






25. Intended for environments that require systems to handle classified data.






26. The Security Model Incorporates the ____________ that should be enforced in the system.






27. Which uses Protection Profiles and Security Targets?






28. The group that oversees the processes of evaluation within TCSEC is?






29. The C2 evaluation class of the _________________ offers controlled access protection.






30. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






31. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






32. Operating System Kernel






33. According to the Orange Book - trusted facility management is not required for which security levels?






34. In the Bell-LaPadula Model the Subject's Label contains ___________________.






35. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






36. Which describe a condition when RAM and Secondary storage are used together?






37. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






38. What are the components of an object's sensitivity label?






39. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






40. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






41. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






42. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






43. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






44. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






45. Happen because input data is not checked for appropriate length at time of input






46. Which TCSEC level first addresses object reuse?






47. Mandatory Protection






48. Trusted facility management is an assurance requirement only for ________________.






49. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






50. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.