SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is called the formal acceptance of the adequacy of a system's overall security by management?
B2 rating
Indexed addressing
Security Policy
Accreditation
2. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Networks and Communications
Accreditation
Integrity
Trusted Distribution
3. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
Orange Book interpretations
C2 - Controlled Access Protection
A1 - Rating
The rule is talking about "Reading"
4. Happen because input data is not checked for appropriate length at time of input
B3
Buffer overflows
Erasable and Programmable Read-Only Memory (EPROM)
Its classification label (Top Secret - Secret or confidential)
5. Subjects and Objects cannot change their security levels once they have been instantiated (created)
The Tranqulity principle (The Bell-LaPadula Model)
A Base Register (Memory Management)
Protection Rings Support
Enforces the rules
6. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Pipelining
Complex Instruction Set Computers (CISC)
The *-Property rule (Star property)
Totality of protection mechanisms
7. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
C1 - Discrection Security Protection is a type of environment
Examples of Layered Operating Systems
B2 rating
8. The Reserved hard drive space used to to extend RAM capabilites.
Swap Space
A Domain
Buffer overflows
A and B
9. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Erasable and Programmable Read-Only Memory (EPROM)
First evaluation class
Virtual storage
Overt channel
10. What does the simple security (ss) property mean in the Bell-LaPadula model?
A Thread
Be protected from modification
No read up
Storage and timing
11. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
C2 - Controlled Access Protection
Constrained
Discretionary Security Property (ds-property)
Division B - Mandatory Protection
12. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Orange Book C
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Prohibits
The security perimeter
13. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
The trustworthiness of an information system
Orange Book - B2
Sensitivity labels
Life Cycle Assurance Requirement
14. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Logical addresses
Orange Book - B1
Trusted hardware - Software and Firmware
Security rating B
15. Intended for environments that require systems to handle classified data.
Protection Rings Support
Be protected from modification
Simple Integrity Axiom
B1 - Labeled Security rating
16. Can be erased - modified and upgraded.
Basic Security Theorem (used in computer science) definition
Ring 3
The security perimeter
Erasable and Programmable Read-Only Memory (EPROM)
17. A type of memory used for High-speed writing and reading activities.
The security perimeter
Cache Memory
Assigned labels
C1 - Discretionary Security Protection
18. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Operational assurance requirements
The rule is talking about "Reading"
Overt channel
Prohibits
19. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
Direct Addressing
Be protected from modification
'Dominate'
The Common Criteria
20. The Orange book does NOT Cover ________________ - And Database management systems
Clark-Wilson Model
Networks and Communications
Types of covert channels
attributability
21. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
B3
Reduced Instruction Set Computers (RISC)
Pipelining
B2 rating
22. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
The security perimeter
Real storage
B3
The "No read Up" rule
23. Verification Protection
Orange Book - B2
The Thread (memory Management)
Orange Book A
The National Computer Security Center (NCSC)
24. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Files - directories and devices
Orange Book - B3
Government and military applications
Clark-Wilson Model
25. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
Be protected from modification
Certification
C2 - Controlled Access Protection
Orange Book - A1
26. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
Mandatory access control
Orange Book B
B3 - Rating
Basic Security Theorem (used in computer science) definition
27. When the contents of the address defined in the program's instruction is added to that of an index register.
Controlling unauthorized downgrading of information
Indexed addressing
Multilevel Security Policies
Physical security
28. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
The reference monitor
Files - directories and devices
The Strong star property rule
Security Policy is clearly defined and documented
29. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
Security mechanisms and evalautes their effectivenes
A single classification and a Compartment Set
The Clark Wilson integrity model
The reference monitor
30. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Dominate the object's sensitivity label
Trusted Products Evaluation Program (TPEP)
Buffer (temporary data storage area)
B2
31. Another word for Primary storage and distinguishes physical memory from virtual memory.
Clark-Wilson Model
Real storage
Firmware
B3
32. A set of objects that a subject is able to access
Types of covert channels
The security perimeter
Constrained
A Domain
33. All users have a clearance for and a formal need to know about - all data processed with the system.
Division C - Discretionary Protection
All Mandatory Access Control (MAC) systems
The Simple Security Property
Dedicated Security Mode
34. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
First evaluation class
C2
Controlling unauthorized downgrading of information
In C2 - Controlled Access Protection environment
35. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Dedicated Security Mode
Orange Book interpretations
Enforces the rules
A security domain
36. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
B3 - Rating
Secondary Storage
All Mandatory Access Control (MAC) systems
Orange Book B
37. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Certification
Bell-LaPadula Model
Trusted hardware - Software and Firmware
Prevent secret information from being accessed
38. When a portion of primary memory is accessed by specifying the actual address of the memory location
Direct addressing
B3 - Security Domains
Need-to-know
Operational assurance requirements
39. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Orange Book - A1
Indirect addressing
Isolate processes
No read down
40. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Mandatory access control is enfored by the use of security labels.
Access Matrix model
Examples of Layered Operating Systems
Orange Book C
Division B - Mandatory Protection
42. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
Discretionary Security Property (ds-property)
Erasable and Programmable Read-Only Memory (EPROM)
Simple Integrity Axiom
The Trusted Computing Base (TCB)
43. In access control terms - the word "dominate" refers to ___________.
Certification
Higher or equal to access class
Ring 1
attributability
44. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
The Strong star property rule
Trusted Products Evaluation Program (TPEP)
No write down
Isolate processes
45. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Orange Book - B1
Access Matrix model
Absolute addresses
Life Cycle Assurance Requirement
46. Contains the ending address
A Limit Register (Memory Management)
Multitasking
Subject to Object Model
A security domain
47. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
A Layered Operating System Architecure
The Monolithic Operation system Architecture
Constrained
Multitasking
48. Which can be used as a covert channel?
Invocation Property
Storage and timing
Government and military applications
Its Clearance Label (Top Secret - Secret - or Confidential)
49. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Its Clearance Label (Top Secret - Secret - or Confidential)
Controlling unauthorized downgrading of information
A Base Register (Memory Management)
Highly secure systems (B2 - B3 and A1)
50. Contains the beginning address
A Base Register (Memory Management)
Absolute addresses
Sensitivity labels
Logical addresses