Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the * (star) property mean in the Bell-LaPadula model?






2. Succesfully Evaluated products are placed on?






3. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






4. The security kernel is the mechanism that _____________ of the reference monitor concept.






5. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






6. Based on a known address with an offset value applied.






7. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






8. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






9. According to the Orange Book - trusted facility management is not required for which security levels?






10. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






11. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






12. The total combination of protection mechanisms within a computer system






13. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






14. When the contents of the address defined in the program's instruction is added to that of an index register.






15. Contains the beginning address






16. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






17. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






18. In the Bell-LaPadula Model the Object's Label contains ___________________.






19. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






20. A domain of trust that shares a single security policy and single management






21. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






22. The Indexed memory addresses that software uses






23. What are the components of an object's sensitivity label?






24. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






25. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






26. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






27. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






28. The Orange book requires protection against two_____________ - which are these Timing and Storage






29. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






30. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






31. Execute one instruction at a time.






32. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






33. When the address location that is specified in the program instruction contains the address of the final desired location.






34. The Physical memory address that the CPU uses






35. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






36. What does the simple integrity axiom mean in the Biba model?






37. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






38. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






39. Which describe a condition when RAM and Secondary storage are used together?






40. Trusted facility management is an assurance requirement only for ________________.






41. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






42. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






43. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






44. Mandatory access control is enfored by the use of security labels.






45. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






46. The Reserved hard drive space used to to extend RAM capabilites.






47. In the Bell-LaPadula Model the Subject's Label contains ___________________.






48. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






49. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






50. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m