Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






2. In the Bell-LaPadula Model the Object's Label contains ___________________.






3. Which is an ISO standard product evaluation criteria that supersedes several different criteria






4. The Orange book does NOT Cover ________________ - And Database management systems






5. System Architecture that separates system functionality into Hierarchical layers






6. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






7. Used by Windows systems to reserve the "Swap Space"






8. Which TCSEC level first addresses object reuse?






9. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






10. The combination of RAM - Cache and the Processor Registers






11. What prevents a process from accessing another process' data?






12. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






13. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






14. The assignment of a specific individual to administer the security-related functions of a system.






15. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






16. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. The Policy must be explicit and well defined and enforced by the mechanisms within the system






18. Documentation must be provided - including test - design - and specification document - user guides and manuals






19. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






20. I/O drivers and utilities






21. As per FDA data should be ______________________________.






22. Individual subjects must be uniquely identified.






23. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






24. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






25. The group that oversees the processes of evaluation within TCSEC is?






26. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






27. The Security Model Incorporates the ____________ that should be enforced in the system.






28. Can be erased - modified and upgraded.






29. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






30. Permits a database to have two records that are identical except for Their classifications






31. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






32. What are the components of an object's sensitivity label?






33. A domain of trust that shares a single security policy and single management






34. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






35. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






36. Which increases the performance in a computer by overlapping the steps of different instructions?






37. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






38. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






39. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






40. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






41. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






42. Applications and user activity






43. Mediates all access and Functions between subjects and objects.






44. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






45. The subject must have Need to Know for ONLY the information they are trying to access.






46. Bell-LaPadula model was proposed for enforcing access control in _____________________.






47. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






48. Intended for environments that require systems to handle classified data.






49. What access control technique is also known as multilevel security?






50. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.