Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






2. Can be erased - modified and upgraded.






3. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






4. The Indexed memory addresses that software uses






5. Mandatory access control is enfored by the use of security labels.






6. The C2 evaluation class of the _________________ offers controlled access protection.






7. A subject at a given clearance may not read an object at a higher classification






8. Which TCSEC level first addresses object reuse?






9. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






10. Another word for Primary storage and distinguishes physical memory from virtual memory.






11. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






12. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






13. The *-Property rule is refered to as ____________.






14. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






15. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






16. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






17. Verification Protection






18. Contains an Address of where the instruction and dara reside that need to be processed.






19. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






20. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






21. In the Bell-LaPadula Model the Subject's Label contains ___________________.






22. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






23. Which describe a condition when RAM and Secondary storage are used together?






24. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






25. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






26. The Bell-LaPadula Model is a _______________.






27. A domain of trust that shares a single security policy and single management






28. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






29. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






30. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






31. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






32. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






33. Which can be used as a covert channel?






34. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






35. The Physical memory address that the CPU uses






36. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






37. All users have a clearance for and a formal need to know about - all data processed with the system.






38. Which is an ISO standard product evaluation criteria that supersedes several different criteria






39. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






40. Execute one instruction at a time.






41. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






42. What does the Clark-Wilson security model focus on






43. Simpler instructions that require fewer clock cycles to execute.






44. The Bell-LaPadula model Subjects and Objects are ___________.






45. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






46. What are the components of an object's sensitivity label?






47. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






48. The total combination of protection mechanisms within a computer system






49. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






50. A Policy based control. All objects and systems have a sensitivity level assigned to them







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests