Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






2. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






3. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






4. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






5. According to the Orange Book - trusted facility management is not required for which security levels?






6. The Physical memory address that the CPU uses






7. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






8. The Security Model Incorporates the ____________ that should be enforced in the system.






9. The Reserved hard drive space used to to extend RAM capabilites.






10. When a portion of primary memory is accessed by specifying the actual address of the memory location






11. Remaining parts of the operating system






12. As per FDA data should be ______________________________.






13. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






14. Which increases the performance in a computer by overlapping the steps of different instructions?






15. Which describe a condition when RAM and Secondary storage are used together?






16. Minimal Security






17. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






18. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






19. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






20. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






21. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






22. Can be erased - modified and upgraded.






23. I/O drivers and utilities






24. Based on a known address with an offset value applied.






25. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






26. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






27. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






28. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






29. What does the * (star) property mean in the Bell-LaPadula model?






30. TCSEC provides a means to evaluate ______________________.






31. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






32. Mediates all access and Functions between subjects and objects.






33. What does the Clark-Wilson security model focus on






34. The combination of RAM - Cache and the Processor Registers






35. Mandatory Access requires that _____________ be attached to all objects.






36. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






38. A system uses the Reference Monitor to ___________________ of a subject and an object?






39. A subject at a given clearance may not read an object at a higher classification






40. System Architecture that separates system functionality into Hierarchical layers






41. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






42. Which is an ISO standard product evaluation criteria that supersedes several different criteria






43. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






44. What does the simple security (ss) property mean in the Bell-LaPadula model?






45. Which would be designated as objects on a MAC system?






46. Which Orange Book evaluation level is described as "Verified Design"?






47. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






48. Which uses Protection Profiles and Security Targets?






49. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






50. Individual subjects must be uniquely identified.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests