SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The assignment of a specific individual to administer the security-related functions of a system.
Networks and Communications
Division D - Minimal Protection
Trusted facility management
Dedicated Security Mode
2. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
Prohibits
The security perimeter
Accreditation
Discretionary Security Property (ds-property)
3. Remaining parts of the operating system
Ring 1
No read up
B1
Operational assurance requirements
4. Permits a database to have two records that are identical except for Their classifications
Polyinstantiation
Accountability - Orange Book
Orange Book - B3
Files - directories and devices
5. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
State machine model
Invocation Property
Assigned labels
All Mandatory Access Control (MAC) systems
6. When the contents of the address defined in the program's instruction is added to that of an index register.
Life Cycle Assurance Requirement
Enforces the rules
Indexed addressing
Trusted Distribution
7. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
Complex Instruction Set Computers (CISC)
Programmable Read-Only Memory (PROM)
A and B
Orange Book - B3
8. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
The Tranqulity principle (The Bell-LaPadula Model)
The security perimeter
*-Integrity Axiom
Orange Book - B3
9. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
Clark-Wilson Model
Swap Space
Subject to Object Model
Higher or equal to access class
10. The Bell-LaPadula model Subjects and Objects are ___________.
Models concerned with integrity
Assigned labels
Process isolation
C1
11. The Biba Model adresses _____________________.
The Tranqulity principle (The Bell-LaPadula Model)
The Integrity of data within applications
Secondary Storage
B3 - Security Domains
12. I/O drivers and utilities
The National Computer Security Center (NCSC)
Networks and Communications
Ring 2
No read down
13. Mandatory Access requires that _____________ be attached to all objects.
Sensitivity labels
Types of covert channels
Multitasking
Clark-Wilson Model
14. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Certification
Process isolation
Programmable Read-Only Memory (PROM)
Primary storage
15. Audit data must be captured and protected to enforce accountability
Accountability - Orange Book
Orange Book ratings
Continuous protection - O/B
Programmable Read-Only Memory (PROM)
16. Succesfully Evaluated products are placed on?
State machine model
A1 - Rating
Operational assurance requirements
The Evaluated Products List (EPL) with their corresponding rating
17. The Physical memory address that the CPU uses
Absolute addresses
Indirect addressing
Totality of protection mechanisms
Programmable Read-Only Memory (PROM)
18. When the RAM and secondary storage are combined the result is __________.
Basic Security Theorem (used in computer science) definition
Multiprocessing
Virtual Memory
Complex Instruction Set Computers (CISC)
19. When the address location that is specified in the program instruction contains the address of the final desired location.
The Simple Security Property
Orange Book A
Indirect addressing
Attributable data
20. In the Bell-LaPadula Model the Subject's Label contains ___________________.
'Dominate'
Its Clearance Label (Top Secret - Secret - or Confidential)
The Biba Model
Life-cycle assurance - O/B
21. What does the simple integrity axiom mean in the Biba model?
Division C - Discretionary Protection
Indexed addressing
Division B - Mandatory Protection Architecture
No read down
22. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Life-cycle assurance - O/B
Ring 3
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The security perimeter
23. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
The security kernel
A1 - Rating
Trusted Products Evaluation Program (TPEP)
Operational assurance requirements
24. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Its classification label (Top Secret - Secret or confidential)
Administrative declaration
An abstract machine
B3
25. Which in the Orange Book ratings represents the highest level of trust?
A lattice of Intergrity Levels
B2
Pagefile.sys file
Dominate the object's sensitivity label
26. What access control technique is also known as multilevel security?
Mandatory access control
Continuous protection - O/B
Access Matrix model
Attributable - original - accurate - contemporaneous and legible
27. Which can be used as a covert channel?
Invocation Property
Storage and timing
Basic Security Theorem (used in computer science) definition
Orange Book A
28. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Orange Book - B2
Simple Integrity Axiom
Isolate processes
Orange Book C
29. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book A
A lattice of Intergrity Levels
Orange Book - A1
The Red Book
30. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Ring 0
Multiprocessing
Implement software or systems in a production environment
Access control to the objects by the subjects
31. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Security Policy
Prohibits
Be protected from modification
Programmable Read-Only Memory (PROM)
32. When a vendor submits a product for evaluation - it submits it to the ____________.
Fail safe
Identification - Orange Book
The National Computer Security Center (NCSC)
Virtual Memory
33. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
Identification - Orange Book
The Monolithic Operation system Architecture
A1 - Rating
Erasable and Programmable Read-Only Memory (EPROM)
34. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
C2 - Controlled Access Protection
The Trusted Computing Base (TCB)
The Clark Wilson integrity model
Most commonly used approach
36. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Orange Book A
The TCSEC - Aka Orange Book
The Red Book
Trusted Network Interpretation (TNI)
37. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Attributable - original - accurate - contemporaneous and legible
Models concerned with integrity
The rule is talking about "Reading"
Process isolation
38. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Examples of Layered Operating Systems
A Limit Register (Memory Management)
C2
Its classification label (Top Secret - Secret or confidential)
39. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Division B - Mandatory Protection Architecture
Bell-LaPadula Model
Stored in Reak Memory
Logical addresses
40. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Clark-Wilson Model
Life Cycle Assurance Requirement
Buffer overflows
41. The security kernel is the mechanism that _____________ of the reference monitor concept.
Pagefile.sys file
System High Security Mode
Enforces the rules
D
42. Individual subjects must be uniquely identified.
Secondary Storage
C2
Identification - Orange Book
Swap Space
43. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
The Red Book
Life Cycle Assurance Requirement
Multiprocessing
C2 - Controlled Access Protection
44. The Reserved hard drive space used to to extend RAM capabilites.
B1 - Labeled Security rating
The "No write Down" Rule
Swap Space
Accountability - Orange Book
45. The group that oversees the processes of evaluation within TCSEC is?
The Rule is talking about writing
Trusted Products Evaluation Program (TPEP)
Direct addressing
A Thread
46. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
B2 rating
Firmware
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The Strong star property rule
47. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
'Dominate'
The *-Property rule (Star property)
Erasable and Programmable Read-Only Memory (EPROM)
A Thread
48. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Prohibits
C1
Clark-Wilson Model
Thrashing
49. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Implement software or systems in a production environment
Assigned labels
Bell-LaPadula Model
Orange Book ratings
50. Contains the beginning address
Access control to the objects by the subjects
A Base Register (Memory Management)
attributability
Multiprocessing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests