Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






2. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






3. When the contents of the address defined in the program's instruction is added to that of an index register.






4. When a portion of primary memory is accessed by specifying the actual address of the memory location






5. Contains an Address of where the instruction and dara reside that need to be processed.






6. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






7. The Reserved hard drive space used to to extend RAM capabilites.






8. What model use an access control triples and requires that the system maintain separation of duty ?






9. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






10. System Architecture that separates system functionality into Hierarchical layers






11. The Orange book does NOT Cover ________________ - And Database management systems






12. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






13. The Physical memory address that the CPU uses






14. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






15. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






16. Mandatory Protection






17. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






18. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






19. Which can be used as a covert channel?






20. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






21. When a computer uses more than one CPU in parallel to execute instructions is known as?






22. A subject at a given clearance may not read an object at a higher classification






23. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






24. What access control technique is also known as multilevel security?






25. Based on a known address with an offset value applied.






26. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






27. Access control labels must be associated properly with objects.






28. Users need to be Identified individually to provide more precise acces control and auditing functionality.






29. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






30. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






31. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






32. Verification Protection






33. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






34. Which is an ISO standard product evaluation criteria that supersedes several different criteria






35. TCSEC provides a means to evaluate ______________________.






36. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






37. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






38. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






39. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






40. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






41. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






42. The TCB is the ________________ within a computer system that work together to enforce a security policy.






43. When a vendor submits a product for evaluation - it submits it to the ____________.






44. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






45. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






46. Which is a straightforward approach that provides access rights to subjects for objects?






47. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






48. A set of objects that a subject is able to access






49. Intended for environments that require systems to handle classified data.






50. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests