SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
The Rule is talking about writing
Indirect addressing
A Layered Operating System Architecure
Discretionary Security Property (ds-property)
2. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Compare the security labels
Orange Book ratings
Execution Domain
B1 - Labeled Security rating
3. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
B1 - Labeled Security
B2 - Structured Protection
C2
Secondary Storage
4. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Orange Book - B3
attributability
System High Security Mode
Certification
5. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Be protected from modification
Absolute addresses
Clark-Wilson Model
Compare the security labels
6. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
B3
B2 rating
Orange Book ratings
Orange Book C
7. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Disclosure of residual data
Ring 2
A Domain
A Limit Register (Memory Management)
8. Subjects and Objects cannot change their security levels once they have been instantiated (created)
C2
The Tranqulity principle (The Bell-LaPadula Model)
Government and military applications
Buffer (temporary data storage area)
9. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Constrained
The rule is talking about "Reading"
Continuous protection - O/B
Swap Space
10. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
A Base Register (Memory Management)
Orange Book - A1
Isolate processes
Division C - Discretionary Protection
11. When the address location that is specified in the program instruction contains the address of the final desired location.
A Domain
A Limit Register (Memory Management)
B2
Indirect addressing
12. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Continuous protection - O/B
A and B
Constrained
Overt channel
13. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Higher or equal to access class
Physical security
C2
First evaluation class
14. Which increases the performance in a computer by overlapping the steps of different instructions?
Division B - Mandatory Protection Architecture
B2
Pipelining
The Thread (memory Management)
15. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Logical addresses
Life Cycle Assurance Requirement
Division C - Discretionary Protection
Orange Book - B1
16. According to the Orange Book - trusted facility management is not required for which security levels?
B1
C1 - Discrection Security Protection is a type of environment
An abstract machine
Indexed addressing
17. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
The TCSEC - Aka Orange Book
Bell-LaPadula Model
Execution Domain
Certification
18. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Implement software or systems in a production environment
Covert channels
Trusted Network Interpretation (TNI)
Multilevel Security Policies
19. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
Bell-LaPadula Model
The Security Kernel
In C2 - Controlled Access Protection environment
20. Involves sharing the processor amoung all ready processes
Direct Addressing
Multitasking
Higher or equal to access class
System High Security Mode
21. Users need to be Identified individually to provide more precise acces control and auditing functionality.
Prevent secret information from being accessed
Swap Space
C2 - Controlled Access Protection
Assigned labels
22. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Trusted hardware - Software and Firmware
Division B - Mandatory Protection Architecture
The "No read Up" rule
Totality of protection mechanisms
23. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
attributability
A Domain
Accountability - Orange Book
D
24. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
A lattice of Intergrity Levels
All Mandatory Access Control (MAC) systems
Covert channels
security protection mechanisms
25. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
International Standard 15408
B2 - Structured Protection
Programmable Read-Only Memory (PROM)
A single classification and a Compartment Set
26. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Constrained
Multilevel Security Policies
B3 - Rating
Covert channels
27. Applications and user activity
Covert channels
Ring 3
Security Policy is clearly defined and documented
A single classification and a Compartment Set
28. Which describe a condition when RAM and Secondary storage are used together?
Division B - Mandatory Protection Architecture
Virtual storage
Subject to Object Model
Need-to-know
29. Can be erased - modified and upgraded.
Orange Book B
Erasable and Programmable Read-Only Memory (EPROM)
The TCSEC - Aka Orange Book
Constrained
30. TCSEC provides a means to evaluate ______________________.
The trustworthiness of an information system
First evaluation class
The Red Book
*-Integrity Axiom
31. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
The Simple Security Property
Security rating B
The Trusted Computing Base (TCB)
Ring 1
32. Happen because input data is not checked for appropriate length at time of input
Buffer overflows
Polyinstantiation
NOT Integrity
B2 - Structured Protection
33. As per FDA data should be ______________________________.
Orange Book - D
Attributable - original - accurate - contemporaneous and legible
No read down
Administrative declaration
34. The Orange book requires protection against two_____________ - which are these Timing and Storage
Types of covert channels
Security Policy
The "No write Down" Rule
Controlling unauthorized downgrading of information
35. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
Invocation Property
State machine model
C2 - Controlled Access Protection
The Simple Security Property
36. Intended for environments that require systems to handle classified data.
Evaluated separately
B1 - Labeled Security rating
No read up
Multitasking
37. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
Orange Book - B3
Orange Book - B2
A Layered Operating System Architecure
Basic Security Theorem (used in computer science) definition
38. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
Government and military applications
Access Matrix model
D
C2
39. When a computer uses more than one CPU in parallel to execute instructions is known as?
Clark-Wilson Model
Invocation Property
Firmware
Multiprocessing
40. Used by Windows systems to reserve the "Swap Space"
Process isolation
Sensitivity labels
Pagefile.sys file
No read up
41. The TCB is the ________________ within a computer system that work together to enforce a security policy.
NOT Integrity
Orange Book - D
Life Cycle Assurance Requirement
Totality of protection mechanisms
42. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
security protection mechanisms
Secondary Storage
Virtual storage
No read up
43. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
Higher or equal to access class
Simple Integrity Axiom
Mandatory access control
Stored in Reak Memory
44. Another word for Primary storage and distinguishes physical memory from virtual memory.
Clark-Wilson Model
Real storage
Trusted facility management
Continuous protection - O/B
45. Should always trace to individuals responsible for observing and recording the data
The National Computer Security Center (NCSC)
Security mechanisms and evalautes their effectivenes
Attributable data
Isolate processes
46. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Ring 0
B1
B3
Simple Integrity Axiom
47. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Mandatory Access Control (MAC)
Trusted Distribution
Primary storage
A security domain
48. The assignment of a specific individual to administer the security-related functions of a system.
Attributable - original - accurate - contemporaneous and legible
State machine model
Trusted facility management
The Common Criteria
49. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Security Policy is clearly defined and documented
C1 - Discretionary Security Protection
The Integrity of data within applications
Thrashing
50. Based on a known address with an offset value applied.
Division D - Minimal Protection
Relative Addresses
Ring 2
Operational assurance requirements
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests