Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






2. The Physical memory address that the CPU uses






3. According to the Orange Book - trusted facility management is not required for which security levels?






4. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






5. System Architecture that separates system functionality into Hierarchical layers






6. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






7. The Security Model Incorporates the ____________ that should be enforced in the system.






8. The Bell-LaPadula model Subjects and Objects are ___________.






9. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






10. TCSEC provides a means to evaluate ______________________.






11. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






12. Users need to be Identified individually to provide more precise acces control and auditing functionality.






13. What model use an access control triples and requires that the system maintain separation of duty ?






14. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






15. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






16. When the RAM and secondary storage are combined the result is __________.






17. The Availability - Integrity and confidentiality requirements of multitasking operating systems






18. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






19. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






20. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






21. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






22. Access control labels must be associated properly with objects.






23. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






24. What does the * (star) property mean in the Bell-LaPadula model?






25. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






26. The Bell-LaPadula Model is a _______________.






27. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






28. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






29. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






30. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






31. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






32. Data in Cache can be accessed much more quickly than Data






33. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






34. Discretionary protection






35. Permits a database to have two records that are identical except for Their classifications






36. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






37. Which is an ISO standard product evaluation criteria that supersedes several different criteria






38. A domain of trust that shares a single security policy and single management






39. A Policy based control. All objects and systems have a sensitivity level assigned to them






40. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






41. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






42. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






43. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






44. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






45. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






46. When a portion of primary memory is accessed by specifying the actual address of the memory location






47. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






48. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






49. When the contents of the address defined in the program's instruction is added to that of an index register.






50. Minimal Security







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests