SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
A single classification and a Compartment Set
C1 - Discrection Security Protection is a type of environment
security protection mechanisms
An abstract machine
2. Applications and user activity
C1
Types of covert channels
Ring 3
The reference monitor
3. A Policy based control. All objects and systems have a sensitivity level assigned to them
Thrashing
Real storage
Mandatory Access Control (MAC)
Life Cycle Assurance Requirement
4. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Physical security
Buffer (temporary data storage area)
Orange Book interpretations
Highly secure systems (B2 - B3 and A1)
5. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
B2 rating
Compare the security labels
Prohibits
Security Policy
6. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
C2 - Controlled Access Protection
Polyinstantiation
Totality of protection mechanisms
Ring 3
7. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book - A1
C2 - Controlled Access Protection
The reference monitor
Highly secure systems (B2 - B3 and A1)
8. Individual subjects must be uniquely identified.
A and B
Multiprocessing
The Security Kernel
Identification - Orange Book
9. Should always trace to individuals responsible for observing and recording the data
A Limit Register (Memory Management)
Attributable data
Secondary Storage
Buffer (temporary data storage area)
10. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
All Mandatory Access Control (MAC) systems
The Rule is talking about writing
Orange Book - B2
C1 - Discrection Security Protection is a type of environment
11. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Prevent secret information from being accessed
A lattice of Intergrity Levels
Integrity
Orange Book ratings
12. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
Access control to the objects by the subjects
Covert channels
B3
13. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Networks and Communications
Need-to-know
Real storage
Indirect addressing
14. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
System High Security Mode
TCB (Trusted Computing Base)
Controlling unauthorized downgrading of information
Examples of Layered Operating Systems
15. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Administrative declaration
Pagefile.sys file
A security domain
Evaluated separately
16. The Biba Model adresses _____________________.
Reduced Instruction Set Computers (RISC)
The Integrity of data within applications
Overt channel
Clark-Wilson
17. Used by Windows systems to reserve the "Swap Space"
Mandatory access control
Accreditation
The *-Property rule (Star property)
Pagefile.sys file
18. What does the Clark-Wilson security model focus on
Integrity
The security kernel
Documentation - Orange Book
The Simple Security Property
19. According to the Orange Book - trusted facility management is not required for which security levels?
Its classification label (Top Secret - Secret or confidential)
Access Matrix model
B1
International Standard 15408
20. TCSEC provides a means to evaluate ______________________.
Access Matrix model
The TCSEC - Aka Orange Book
Simple Integrity Axiom
The trustworthiness of an information system
21. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
Ring 0
The reference monitor
Identification - Orange Book
Buffer overflows
22. As per FDA data should be ______________________________.
Attributable - original - accurate - contemporaneous and legible
The Evaluated Products List (EPL) with their corresponding rating
System High Security Mode
The Red Book
23. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Discretionary Security Property (ds-property)
B2 - Structured Protection
The Common Criteria
First evaluation class
24. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Logical addresses
The security perimeter
The "No read Up" rule
Execution Domain
25. The subject must have Need to Know for ONLY the information they are trying to access.
System High Security Mode
B3 - Security Domains
A1 - Rating
Cache Memory
26. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. The TCB is the ________________ within a computer system that work together to enforce a security policy.
All Mandatory Access Control (MAC) systems
Life Cycle Assurance Requirement
Covert channels
Totality of protection mechanisms
28. What access control technique is also known as multilevel security?
Mandatory access control
The "No write Down" Rule
Security rating B
The Red Book
29. The combination of RAM - Cache and the Processor Registers
Primary storage
C1 - Discretionary Security Protection
A and B
Division C - Discretionary Protection
30. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
Virtual Memory
Fail safe
Multiprocessing
Documentation - Orange Book
31. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Erasable and Programmable Read-Only Memory (EPROM)
The rule is talking about "Reading"
The TCSEC - Aka Orange Book
32. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
The Simple Security Property
Erasable and Programmable Read-Only Memory (EPROM)
Documentation - Orange Book
The security perimeter
33. When the contents of the address defined in the program's instruction is added to that of an index register.
TCB (Trusted Computing Base)
Highly secure systems (B2 - B3 and A1)
A Domain
Indexed addressing
34. A type of memory used for High-speed writing and reading activities.
Constrained
Cache Memory
Assigned labels
C2 - Controlled Access Protection
35. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
No read down
Simple Integrity Axiom
B2 rating
36. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
The National Computer Security Center (NCSC)
Types of covert channels
Pagefile.sys file
In C2 - Controlled Access Protection environment
37. Based on a known address with an offset value applied.
Dominate the object's sensitivity label
The Integrity of data within applications
A1
Relative Addresses
38. The Orange book does NOT Cover ________________ - And Database management systems
Simple Security Rule
Networks and Communications
Disclosure of residual data
Clark-Wilson
39. A set of objects that a subject is able to access
A Domain
Secondary Storage
Labels - Orange Book
Swap Space
40. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Prevent secret information from being accessed
Secondary Storage
First evaluation class
Life Cycle Assurance Requirement
41. Succesfully Evaluated products are placed on?
Ring 3
The "No write Down" Rule
State machine model
The Evaluated Products List (EPL) with their corresponding rating
42. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
Swap Space
A1 - Rating
Polyinstantiation
Complex Instruction Set Computers (CISC)
43. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Access control to the objects by the subjects
Swap Space
Trusted Distribution
Ring 2
44. The Orange book requires protection against two_____________ - which are these Timing and Storage
A Layered Operating System Architecure
Isolate processes
Types of covert channels
A security kernel
45. Contains the beginning address
A Base Register (Memory Management)
A Domain
Orange Book interpretations
Dominate the object's sensitivity label
46. Subjects and Objects cannot change their security levels once they have been instantiated (created)
The rule is talking about "Reading"
The Tranqulity principle (The Bell-LaPadula Model)
*-Integrity Axiom
Multiprocessing
47. The Physical memory address that the CPU uses
Simple Security Rule
Controlling unauthorized downgrading of information
Absolute addresses
A Limit Register (Memory Management)
48. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Primary storage
Physical security
Ring 0
Access Matrix model
49. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
Its classification label (Top Secret - Secret or confidential)
Basic Security Theorem (used in computer science) definition
A1 - Rating
All Mandatory Access Control (MAC) systems
50. Which increases the performance in a computer by overlapping the steps of different instructions?
Orange Book - B1
Implement software or systems in a production environment
Pipelining
Firmware
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests