SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Availability - Integrity and confidentiality requirements of multitasking operating systems
Clark-Wilson Model
Protection Rings Support
The security perimeter
The Security Kernel
2. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Compare the security labels
Orange Book - A1
Division D - Minimal Protection
The Evaluated Products List (EPL) with their corresponding rating
3. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Simple Security Rule
Complex Instruction Set Computers (CISC)
Virtual storage
The Strong star property rule
4. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
A Thread
Division C - Discretionary Protection
Constrained
Evaluated separately
5. Individual subjects must be uniquely identified.
First evaluation class
Identification - Orange Book
Prohibits
Absolute addresses
6. Which TCSEC level first addresses object reuse?
Multilevel Security Policies
The Integrity of data within applications
Dedicated Security Mode
C2
7. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
'Dominate'
A lattice of Intergrity Levels
Virtual Memory
Security mechanisms and evalautes their effectivenes
8. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Security Policy is clearly defined and documented
Security rating B
The Security Kernel
Scalar processors
9. The security kernel is the mechanism that _____________ of the reference monitor concept.
Accountability - Orange Book
International Standard 15408
Enforces the rules
Firmware
10. The Orange book does NOT Cover ________________ - And Database management systems
Multiprocessing
Networks and Communications
Buffer (temporary data storage area)
Storage and timing
11. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
The Monolithic Operation system Architecture
NOT Integrity
Logical addresses
Execution Domain
12. Based on a known address with an offset value applied.
Relative Addresses
Simple Security Rule
The security perimeter
Be protected from modification
13. Which is a straightforward approach that provides access rights to subjects for objects?
Orange Book ratings
Clark-Wilson Model
attributability
Access Matrix model
14. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Stored in Reak Memory
C1
A Thread
C1 - Discrection Security Protection is a type of environment
15. What are the components of an object's sensitivity label?
Orange Book - A1
Virtual storage
Real storage
A single classification and a Compartment Set
16. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
Indirect addressing
C1
C2 - Controlled Access Protection
Assigned labels
17. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
The Common Criteria
The Integrity of data within applications
The Monolithic Operation system Architecture
Orange Book ratings
18. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Reduced Instruction Set Computers (RISC)
Security Policy - Orange Book
Life-cycle assurance - O/B
The TCSEC - Aka Orange Book
20. Each data object must contain a classification label and each subject must have a clearance label.
Basic Security Theorem (used in computer science) definition
Execution Domain
B1 - Labeled Security
Absolute addresses
21. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
C1
TCB (Trusted Computing Base)
C2
Orange Book interpretations
22. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Accreditation
Protection Rings Support
Models concerned with integrity
Controls the checks
23. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Administrative declaration
Programmable Read-Only Memory (PROM)
The Common Criteria
The security kernel
24. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Trusted Distribution
The rule is talking about "Reading"
Security Policy is clearly defined and documented
Bell-LaPadula Model
25. Involves sharing the processor amoung all ready processes
Multitasking
Enforces the rules
Its classification label (Top Secret - Secret or confidential)
The Simple Security Property
26. In the Bell-LaPadula Model the Object's Label contains ___________________.
An abstract machine
B3 - Rating
Its classification label (Top Secret - Secret or confidential)
Prevent secret information from being accessed
27. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Types of covert channels
No write down
A and B
Access control to the objects by the subjects
28. In access control terms - the word "dominate" refers to ___________.
Higher or equal to access class
Division C - Discretionary Protection
C2 - Controlled Access Protection
B3 - Security Domains
29. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Orange Book - B3
Sensitivity labels
Totality of protection mechanisms
A Limit Register (Memory Management)
30. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
Simple Integrity Axiom
Security Policy is clearly defined and documented
Ring 1
'Dominate'
31. What prevents a process from accessing another process' data?
Sensitivity labels
The reference monitor
Process isolation
Fail safe
32. The Reserved hard drive space used to to extend RAM capabilites.
An abstract machine
Swap Space
A1 - Rating
C1 - Discretionary Security Protection
33. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Primary storage
Bell-LaPadula Model
The "No read Up" rule
The Tranqulity principle (The Bell-LaPadula Model)
34. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Disclosure of residual data
Covert channels
Ring 3
No read down
35. Verification Protection
The Security Kernel
Controlling unauthorized downgrading of information
Stored in Reak Memory
Orange Book A
36. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Its classification label (Top Secret - Secret or confidential)
Primary storage
Life Cycle Assurance Requirement
A security domain
37. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Integrity
Labels - Orange Book
Orange Book interpretations
Evaluated separately
38. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
C1 - Discretionary Security Protection
B3
Relative Addresses
Swap Space
39. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
The security perimeter
Prevent secret information from being accessed
Dedicated Security Mode
Overt channel
40. Simpler instructions that require fewer clock cycles to execute.
Reduced Instruction Set Computers (RISC)
Multitasking
A Domain
The Monolithic Operation system Architecture
41. Which would be designated as objects on a MAC system?
No write down
Files - directories and devices
The National Computer Security Center (NCSC)
The Red Book
42. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Orange Book - B2
The Rule is talking about writing
D
Stored in Reak Memory
43. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
Subject to Object Model
Orange Book - B2
NOT Integrity
The reference monitor
44. What model use an access control triples and requires that the system maintain separation of duty ?
Trusted Network Interpretation (TNI)
The "No read Up" rule
Division C - Discretionary Protection
Clark-Wilson
45. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
B1 - Labeled Security
Life-cycle assurance - O/B
Thrashing
First evaluation class
46. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
The TCSEC - Aka Orange Book
Ring 3
Prohibits
The *-Property rule (Star property)
47. A system uses the Reference Monitor to ___________________ of a subject and an object?
A security kernel
The rule is talking about "Reading"
Certification
Compare the security labels
48. Execute one instruction at a time.
Scalar processors
Division C - Discretionary Protection
Administrative declaration
Orange Book - B2
49. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
Orange Book - B2
A lattice of Intergrity Levels
The rule is talking about "Reading"
Most commonly used approach
50. The Physical memory address that the CPU uses
'Dominate'
The Simple Security Property
Absolute addresses
Orange Book - D