Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Simpler instructions that require fewer clock cycles to execute.






2. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






3. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






4. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






5. Which is a straightforward approach that provides access rights to subjects for objects?






6. A system uses the Reference Monitor to ___________________ of a subject and an object?






7. Which describe a condition when RAM and Secondary storage are used together?






8. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






9. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






10. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






11. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






12. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






13. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






14. As per FDA data should be ______________________________.






15. The Bell-LaPadula model Subjects and Objects are ___________.






16. When the contents of the address defined in the program's instruction is added to that of an index register.






17. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






18. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






19. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






20. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






21. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






22. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






23. Which is an ISO standard product evaluation criteria that supersedes several different criteria






24. Mediates all access and Functions between subjects and objects.






25. A set of objects that a subject is able to access






26. When the address location that is specified in the program instruction contains the address of the final desired location.






27. The Indexed memory addresses that software uses






28. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






29. According to the Orange Book - trusted facility management is not required for which security levels?






30. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






31. The Physical memory address that the CPU uses






32. A subject at a given clearance may not read an object at a higher classification






33. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






34. Based on a known address with an offset value applied.






35. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






36. I/O drivers and utilities






37. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






38. The Reserved hard drive space used to to extend RAM capabilites.






39. Data in Cache can be accessed much more quickly than Data






40. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






41. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






42. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






43. Contains an Address of where the instruction and dara reside that need to be processed.






44. Access control labels must be associated properly with objects.






45. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






46. Individual subjects must be uniquely identified.






47. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






48. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






49. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






50. Users need to be Identified individually to provide more precise acces control and auditing functionality.