Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






2. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






3. In access control terms - the word "dominate" refers to ___________.






4. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






5. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






6. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






7. Which TCSEC level first addresses object reuse?






8. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






9. Trusted facility management is an assurance requirement only for ________________.






10. System Architecture that separates system functionality into Hierarchical layers






11. What does the * (star) property mean in the Bell-LaPadula model?






12. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






13. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






14. Applications and user activity






15. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






16. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






17. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






18. The TCB is the ________________ within a computer system that work together to enforce a security policy.






19. Based on a known address with an offset value applied.






20. Execute one instruction at a time.






21. Verification Protection






22. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






23. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






24. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






25. Which uses Protection Profiles and Security Targets?






26. The Reserved hard drive space used to to extend RAM capabilites.






27. Which would be designated as objects on a MAC system?






28. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






29. The Availability - Integrity and confidentiality requirements of multitasking operating systems






30. Mandatory Protection






31. I/O drivers and utilities






32. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






33. What does the simple integrity axiom mean in the Biba model?






34. When a computer uses more than one CPU in parallel to execute instructions is known as?






35. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






36. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






37. What does the Clark-Wilson security model focus on






38. When a vendor submits a product for evaluation - it submits it to the ____________.






39. Each data object must contain a classification label and each subject must have a clearance label.






40. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






41. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






42. A Policy based control. All objects and systems have a sensitivity level assigned to them






43. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






44. A subject at a given clearance may not read an object at a higher classification






45. Mediates all access and Functions between subjects and objects.






46. Permits a database to have two records that are identical except for Their classifications






47. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. Individual subjects must be uniquely identified.






49. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






50. Contains the ending address