SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As per FDA data should be ______________________________.
Pipelining
Buffer overflows
Attributable - original - accurate - contemporaneous and legible
Orange Book - B2
2. When a computer uses more than one CPU in parallel to execute instructions is known as?
C1 - Discrection Security Protection is a type of environment
Sensitivity labels
Multiprocessing
Higher or equal to access class
3. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Bell-LaPadula Model
The Strong star property rule
Erasable and Programmable Read-Only Memory (EPROM)
The Evaluated Products List (EPL) with their corresponding rating
4. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Compare the security labels
Basic Security Theorem (used in computer science) definition
Primary storage
B2 - Structured Protection
5. Access control labels must be associated properly with objects.
Prevent secret information from being accessed
B1 - Labeled Security rating
Labels - Orange Book
Examples of Layered Operating Systems
6. What is called the formal acceptance of the adequacy of a system's overall security by management?
Trusted Distribution
Disclosure of residual data
The Red Book
Accreditation
7. Mediates all access and Functions between subjects and objects.
Division B - Mandatory Protection
The Rule is talking about writing
The Biba Model
The Security Kernel
8. Which TCSEC level first addresses object reuse?
Government and military applications
Programmable Read-Only Memory (PROM)
C2
Covert channels
9. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Secondary Storage
A Thread
Be protected from modification
Implement software or systems in a production environment
10. The Orange book does NOT Cover ________________ - And Database management systems
The *-Property rule (Star property)
The Security Kernel
Networks and Communications
The Monolithic Operation system Architecture
11. Audit data must be captured and protected to enforce accountability
Examples of Layered Operating Systems
The security kernel
Integrity
Accountability - Orange Book
12. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The Red Book
The Rule is talking about writing
Programmable Read-Only Memory (PROM)
Trusted Products Evaluation Program (TPEP)
13. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Firmware
Clark-Wilson Model
Process isolation
Life Cycle Assurance Requirement
14. All users have a clearance for and a formal need to know about - all data processed with the system.
B3 - Rating
Primary storage
Labels - Orange Book
Dedicated Security Mode
15. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
A lattice of Intergrity Levels
Security rating B
*-Integrity Axiom
Polyinstantiation
16. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
First evaluation class
Access control to the objects by the subjects
Direct addressing
B1 - Labeled Security
17. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
Trusted Distribution
A Layered Operating System Architecure
Clark-Wilson
The rule is talking about "Reading"
18. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
Trusted hardware - Software and Firmware
Trusted Products Evaluation Program (TPEP)
A1 - Rating
Attributable - original - accurate - contemporaneous and legible
19. What does the * (star) property mean in the Bell-LaPadula model?
Security Policy
A1 - Rating
No write down
The Integrity of data within applications
20. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Division D - Minimal Protection
C2
Trusted Network Interpretation (TNI)
Life-cycle assurance - O/B
21. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. The combination of RAM - Cache and the Processor Registers
Protection Rings Support
Integrity
Prevent secret information from being accessed
Primary storage
23. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
B1 - Labeled Security
The Clark Wilson integrity model
Types of covert channels
Access control to the objects by the subjects
24. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
A Domain
Bell-LaPadula Model
Overt channel
Identification - Orange Book
25. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Be protected from modification
In C2 - Controlled Access Protection environment
Erasable and Programmable Read-Only Memory (EPROM)
26. What does the simple security (ss) property mean in the Bell-LaPadula model?
The Biba Model
The security perimeter
Attributable - original - accurate - contemporaneous and legible
No read up
27. What does the Clark-Wilson security model focus on
The Rule is talking about writing
Integrity
Direct Addressing
Higher or equal to access class
28. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Orange Book - B2
The Monolithic Operation system Architecture
Be protected from modification
A1 - Rating
29. A domain of trust that shares a single security policy and single management
Invocation Property
Indexed addressing
A Limit Register (Memory Management)
A security domain
30. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Life-cycle assurance - O/B
Security Policy is clearly defined and documented
Multitasking
Discretionary Security Property (ds-property)
31. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The reference monitor
All Mandatory Access Control (MAC) systems
Fail safe
Accountability - Orange Book
32. According to the Orange Book - trusted facility management is not required for which security levels?
Covert channels
Multilevel Security Policies
B1
State machine model
33. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
B3
The Trusted Computing Base (TCB)
Discretionary Security Property (ds-property)
Relative Addresses
34. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Most commonly used approach
Division C - Discretionary Protection
Storage and timing
International Standard 15408
35. Which is an ISO standard product evaluation criteria that supersedes several different criteria
The Common Criteria
Types of covert channels
Discretionary Security Property (ds-property)
Continuous protection - O/B
36. I/O drivers and utilities
C1 - Discretionary Security Protection
No write down
Ring 2
B3
37. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Access control to the objects by the subjects
Trusted Network Interpretation (TNI)
Dedicated Security Mode
Certification
38. What prevents a process from accessing another process' data?
Process isolation
Orange Book - B2
Dominate the object's sensitivity label
The National Computer Security Center (NCSC)
39. TCB contains The Security Kernel and all ______________.
B2 rating
Its Clearance Label (Top Secret - Secret - or Confidential)
security protection mechanisms
Orange Book - B3
40. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
The *-Property rule (Star property)
Pagefile.sys file
Prohibits
Thrashing
41. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Storage and timing
Buffer (temporary data storage area)
Evaluated separately
D
42. The Bell-LaPadula Model is a _______________.
Its classification label (Top Secret - Secret or confidential)
B3
Government and military applications
Subject to Object Model
43. Succesfully Evaluated products are placed on?
Enforces the rules
Its Clearance Label (Top Secret - Secret - or Confidential)
The Tranqulity principle (The Bell-LaPadula Model)
The Evaluated Products List (EPL) with their corresponding rating
44. Remaining parts of the operating system
The reference monitor
A Layered Operating System Architecure
The Trusted Computing Base (TCB)
Ring 1
45. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Security mechanisms and evalautes their effectivenes
Prevent secret information from being accessed
A Thread
Trusted Products Evaluation Program (TPEP)
46. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Direct addressing
Need-to-know
Security Policy
Multiprocessing
47. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
A Base Register (Memory Management)
No write down
TCB (Trusted Computing Base)
Overt channel
48. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
State machine model
D
Prevent secret information from being accessed
Most commonly used approach
49. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
Scalar processors
Identification - Orange Book
Multitasking
The Trusted Computing Base (TCB)
50. Which can be used as a covert channel?
The security perimeter
Storage and timing
System High Security Mode
Ring 0