SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
C2
Physical security
Controls the checks
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
2. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
Simple Integrity Axiom
Orange Book - B1
Highly secure systems (B2 - B3 and A1)
A Base Register (Memory Management)
3. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
B2
The Clark Wilson integrity model
Orange Book A
C2 - Controlled Access Protection
4. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
The Integrity of data within applications
Storage and timing
The Clark Wilson integrity model
Evaluated separately
5. Documentation must be provided - including test - design - and specification document - user guides and manuals
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Attributable - original - accurate - contemporaneous and legible
A and B
Documentation - Orange Book
6. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Trusted hardware - Software and Firmware
B3 - Rating
A Thread
security protection mechanisms
7. What are the components of an object's sensitivity label?
Attributable data
Pagefile.sys file
Life Cycle Assurance Requirement
A single classification and a Compartment Set
8. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
System High Security Mode
Constrained
Most commonly used approach
C1 - Discretionary Security Protection
9. Contains the ending address
Orange Book - A1
A Limit Register (Memory Management)
Government and military applications
attributability
10. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Accreditation
Most commonly used approach
B1 - Labeled Security rating
Execution Domain
11. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Continuous protection - O/B
The National Computer Security Center (NCSC)
Storage and timing
Stored in Reak Memory
12. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
Buffer overflows
A single classification and a Compartment Set
The Monolithic Operation system Architecture
13. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
B2 rating
Complex Instruction Set Computers (CISC)
Division D - Minimal Protection
The Strong star property rule
14. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
The rule is talking about "Reading"
A Base Register (Memory Management)
Clark-Wilson Model
Orange Book - B2
16. Audit data must be captured and protected to enforce accountability
Accountability - Orange Book
Stored in Reak Memory
No write down
Virtual Memory
17. Succesfully Evaluated products are placed on?
The Evaluated Products List (EPL) with their corresponding rating
Orange Book ratings
Access Matrix model
Direct Addressing
18. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Orange Book B
B3 - Security Domains
A1
Orange Book - B1
19. When the address location that is specified in the program instruction contains the address of the final desired location.
Indirect addressing
The Integrity of data within applications
Access control to the objects by the subjects
A security domain
20. Users need to be Identified individually to provide more precise acces control and auditing functionality.
Life-cycle assurance - O/B
Accountability - Orange Book
Ring 0
C2 - Controlled Access Protection
21. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
C2
Orange Book C
Constrained
Prohibits
22. When a vendor submits a product for evaluation - it submits it to the ____________.
Controls the checks
The National Computer Security Center (NCSC)
Operational assurance requirements
Real storage
23. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Cache Memory
C1 - Discretionary Security Protection
The Common Criteria
security protection mechanisms
24. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
No read down
Prevent secret information from being accessed
B2 - Structured Protection
Pagefile.sys file
25. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
The security kernel
Virtual storage
Files - directories and devices
Division D - Minimal Protection
26. The Bell-LaPadula model Subjects and Objects are ___________.
Certification
Assigned labels
*-Integrity Axiom
Controls the checks
27. Minimal Security
Relative Addresses
Stored in Reak Memory
Orange Book - D
Sensitivity labels
28. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Accountability - Orange Book
Reduced Instruction Set Computers (RISC)
B2 - Structured Protection
B1
29. Which increases the performance in a computer by overlapping the steps of different instructions?
Discretionary Security Property (ds-property)
Disclosure of residual data
Pipelining
C2 - Controlled Access Protection
30. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Prohibits
Absolute addresses
B3
Trusted Products Evaluation Program (TPEP)
31. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
The *-Property rule (Star property)
Ring 3
In C2 - Controlled Access Protection environment
Isolate processes
32. A set of objects that a subject is able to access
Stored in Reak Memory
A Limit Register (Memory Management)
Division B - Mandatory Protection
A Domain
33. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Be protected from modification
TCB (Trusted Computing Base)
Security Policy is clearly defined and documented
Multilevel Security Policies
34. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
No write down
The security perimeter
Virtual Memory
Invocation Property
35. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Orange Book interpretations
Ring 1
Complex Instruction Set Computers (CISC)
Highly secure systems (B2 - B3 and A1)
36. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
Swap Space
Networks and Communications
Stored in Reak Memory
A and B
37. Bell-LaPadula model was proposed for enforcing access control in _____________________.
A1 - Rating
Overt channel
Government and military applications
Indexed addressing
38. The Orange book requires protection against two_____________ - which are these Timing and Storage
Higher or equal to access class
Types of covert channels
The Evaluated Products List (EPL) with their corresponding rating
Mandatory Access Control (MAC)
39. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
First evaluation class
Clark-Wilson
The National Computer Security Center (NCSC)
40. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
Integrity
No read up
NOT Integrity
The rule is talking about "Reading"
41. Involves sharing the processor amoung all ready processes
Trusted hardware - Software and Firmware
International Standard 15408
Continuous protection - O/B
Multitasking
42. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Operational assurance requirements
Logical addresses
Polyinstantiation
The "No write Down" Rule
43. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Ring 2
Indirect addressing
Mandatory access control
Orange Book - A1
44. Which describe a condition when RAM and Secondary storage are used together?
Virtual storage
Implement software or systems in a production environment
Thrashing
Controlling unauthorized downgrading of information
45. Which is a straightforward approach that provides access rights to subjects for objects?
The Tranqulity principle (The Bell-LaPadula Model)
Ring 3
Access Matrix model
Trusted Products Evaluation Program (TPEP)
46. When the contents of the address defined in the program's instruction is added to that of an index register.
Indexed addressing
B1
The Common Criteria
C2 - Controlled Access Protection
47. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Trusted Distribution
Covert channels
Accreditation
Administrative declaration
48. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
security protection mechanisms
B3
Security rating B
Files - directories and devices
49. As per FDA data should be ______________________________.
Attributable - original - accurate - contemporaneous and legible
security protection mechanisms
The Simple Security Property
The Red Book
50. A Policy based control. All objects and systems have a sensitivity level assigned to them
Mandatory Access Control (MAC)
No write down
Swap Space
Scalar processors
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests