SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Orange book requires protection against two_____________ - which are these Timing and Storage
Compare the security labels
Division C - Discretionary Protection
Its Clearance Label (Top Secret - Secret - or Confidential)
Types of covert channels
2. The Availability - Integrity and confidentiality requirements of multitasking operating systems
Simple Integrity Axiom
Certification
Physical security
Protection Rings Support
3. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Complex Instruction Set Computers (CISC)
Buffer (temporary data storage area)
Security rating B
Logical addresses
4. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
The reference monitor
Mandatory access control
No read up
Orange Book - B2
5. The group that oversees the processes of evaluation within TCSEC is?
No read up
Trusted Products Evaluation Program (TPEP)
Subject to Object Model
The trustworthiness of an information system
6. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Constrained
Examples of Layered Operating Systems
Operational assurance requirements
Prevent secret information from being accessed
7. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Orange Book - B2
Security rating B
Firmware
C2
8. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
C2 - Controlled Access Protection
Networks and Communications
The National Computer Security Center (NCSC)
The security perimeter
9. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
A and B
Networks and Communications
Basic Security Theorem (used in computer science) definition
Invocation Property
10. The Simple Security rule is refered to as______________.
Types of covert channels
The "No read Up" rule
No read up
Orange Book - A1
11. In access control terms - the word "dominate" refers to ___________.
Operational assurance requirements
Ring 0
Mandatory Access Control (MAC)
Higher or equal to access class
12. What model use an access control triples and requires that the system maintain separation of duty ?
Reduced Instruction Set Computers (RISC)
Clark-Wilson
Virtual Memory
Types of covert channels
13. When the RAM and secondary storage are combined the result is __________.
B2
Integrity
Virtual Memory
Security rating B
14. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The Red Book
Thrashing
The security perimeter
Orange Book interpretations
15. Based on a known address with an offset value applied.
Clark-Wilson
Division C - Discretionary Protection
A Thread
Relative Addresses
16. Which Orange Book evaluation level is described as "Verified Design"?
Virtual storage
The Evaluated Products List (EPL) with their corresponding rating
A1
Accreditation
17. According to the Orange Book - trusted facility management is not required for which security levels?
B1
B3
Firmware
C1 - Discretionary Security Protection
18. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Swap Space
Evaluated separately
Reduced Instruction Set Computers (RISC)
Physical security
19. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Its classification label (Top Secret - Secret or confidential)
Division D - Minimal Protection
Life Cycle Assurance Requirement
Overt channel
20. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
B3
Prohibits
Absolute addresses
D
21. Applications and user activity
Dedicated Security Mode
The Monolithic Operation system Architecture
Dedicated Security Mode
Ring 3
22. The assignment of a specific individual to administer the security-related functions of a system.
The reference monitor
C2 - Controlled Access Protection
Trusted facility management
A lattice of Intergrity Levels
23. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
C2 - Controlled Access Protection
Orange Book A
A security kernel
Trusted Distribution
24. Mediates all access and Functions between subjects and objects.
Multiprocessing
Be protected from modification
Fail safe
The Security Kernel
25. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
Need-to-know
Ring 3
Orange Book B
The Clark Wilson integrity model
26. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
Swap Space
C1 - Discretionary Security Protection
C2 - Controlled Access Protection
The Monolithic Operation system Architecture
27. The Security Model Incorporates the ____________ that should be enforced in the system.
Compare the security labels
Accountability - Orange Book
Isolate processes
Security Policy
28. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
A Thread
The reference monitor
The security perimeter
The TCSEC - Aka Orange Book
29. Which TCSEC level first addresses object reuse?
C2
Dedicated Security Mode
Cache Memory
Discretionary Security Property (ds-property)
30. Which uses Protection Profiles and Security Targets?
International Standard 15408
Ring 0
Integrity
B3 - Rating
31. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
D
The *-Property rule (Star property)
C2
B1
32. When a vendor submits a product for evaluation - it submits it to the ____________.
Government and military applications
Its classification label (Top Secret - Secret or confidential)
First evaluation class
The National Computer Security Center (NCSC)
33. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Controlling unauthorized downgrading of information
The National Computer Security Center (NCSC)
Security rating B
Life-cycle assurance - O/B
34. Which would be designated as objects on a MAC system?
Virtual storage
Direct Addressing
Files - directories and devices
Government and military applications
35. What are the components of an object's sensitivity label?
A single classification and a Compartment Set
Identification - Orange Book
Protection Rings Support
A security kernel
36. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Most commonly used approach
Absolute addresses
Attributable data
Life-cycle assurance - O/B
37. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Programmable Read-Only Memory (PROM)
Relative Addresses
Operational assurance requirements
Execution Domain
38. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
No read down
Process isolation
The Rule is talking about writing
NOT Integrity
40. Individual subjects must be uniquely identified.
A1
Trusted facility management
Identification - Orange Book
Real storage
41. A domain of trust that shares a single security policy and single management
Execution Domain
Orange Book - B1
Access Matrix model
A security domain
42. A Policy based control. All objects and systems have a sensitivity level assigned to them
Mandatory Access Control (MAC)
The reference monitor
Erasable and Programmable Read-Only Memory (EPROM)
All Mandatory Access Control (MAC) systems
43. System Architecture that separates system functionality into Hierarchical layers
The TCSEC - Aka Orange Book
Simple Integrity Axiom
A Layered Operating System Architecure
Covert channels
44. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
Security rating B
Files - directories and devices
The Thread (memory Management)
B3
45. The C2 evaluation class of the _________________ offers controlled access protection.
Access Matrix model
Reduced Instruction Set Computers (RISC)
Trusted Network Interpretation (TNI)
The security kernel
46. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
Cache Memory
Ring 2
C2 - Controlled Access Protection
Direct Addressing
47. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
The Biba Model
Simple Integrity Axiom
Orange Book A
The security perimeter
48. Involves sharing the processor amoung all ready processes
Multitasking
Primary storage
The Rule is talking about writing
The Clark Wilson integrity model
49. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Security rating B
Attributable - original - accurate - contemporaneous and legible
D
Accreditation
50. Access control labels must be associated properly with objects.
Trusted hardware - Software and Firmware
Orange Book - B1
Labels - Orange Book
Dedicated Security Mode
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests