Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Involves sharing the processor amoung all ready processes






3. In the Bell-LaPadula Model the Object's Label contains ___________________.






4. Another word for Primary storage and distinguishes physical memory from virtual memory.






5. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






6. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






7. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






8. Each data object must contain a classification label and each subject must have a clearance label.






9. As per FDA data should be ______________________________.






10. Based on a known address with an offset value applied.






11. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






12. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






13. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






14. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






15. Which is a straightforward approach that provides access rights to subjects for objects?






16. When a portion of primary memory is accessed by specifying the actual address of the memory location






17. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






18. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






19. In access control terms - the word "dominate" refers to ___________.






20. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






21. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






22. Verification Protection






23. I/O drivers and utilities






24. Execute one instruction at a time.






25. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






26. Individual subjects must be uniquely identified.






27. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






28. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






29. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






30. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






31. In the Bell-LaPadula Model the Subject's Label contains ___________________.






32. What is called the formal acceptance of the adequacy of a system's overall security by management?






33. What does the simple integrity axiom mean in the Biba model?






34. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






35. Which would be designated as objects on a MAC system?






36. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






37. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






38. Subjects and Objects cannot change their security levels once they have been instantiated (created)






39. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






40. Which in the Orange Book ratings represents the highest level of trust?






41. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






42. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






43. Can be erased - modified and upgraded.






44. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






45. What access control technique is also known as multilevel security?






46. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






47. The *-Property rule is refered to as ____________.






48. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






49. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






50. Bell-LaPadula model was proposed for enforcing access control in _____________________.