Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Contains the beginning address






2. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






3. When a computer uses more than one CPU in parallel to execute instructions is known as?






4. Happen because input data is not checked for appropriate length at time of input






5. Individual subjects must be uniquely identified.






6. Users need to be Identified individually to provide more precise acces control and auditing functionality.






7. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






8. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






9. What prevents a process from accessing another process' data?






10. Which is an ISO standard product evaluation criteria that supersedes several different criteria






11. In the Bell-LaPadula Model the Subject's Label contains ___________________.






12. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






13. What does the simple security (ss) property mean in the Bell-LaPadula model?






14. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






15. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






16. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






17. The Biba Model adresses _____________________.






18. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






19. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. In access control terms - the word "dominate" refers to ___________.






21. Subjects and Objects cannot change their security levels once they have been instantiated (created)






22. TCB contains The Security Kernel and all ______________.






23. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






24. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






25. What are the components of an object's sensitivity label?






26. Which TCSEC level first addresses object reuse?






27. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






28. Can be erased - modified and upgraded.






29. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. The subject must have Need to Know for ONLY the information they are trying to access.






31. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






32. The Bell-LaPadula model Subjects and Objects are ___________.






33. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






34. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






35. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






36. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






37. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






38. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






39. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






40. Documentation must be provided - including test - design - and specification document - user guides and manuals






41. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






42. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






43. Remaining parts of the operating system






44. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






45. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






46. Execute one instruction at a time.






47. A set of objects that a subject is able to access






48. Based on a known address with an offset value applied.






49. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






50. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?