SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Clark-Wilson Model
Highly secure systems (B2 - B3 and A1)
Government and military applications
A Thread
2. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Process isolation
Totality of protection mechanisms
Operational assurance requirements
Controls the checks
3. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Invocation Property
Highly secure systems (B2 - B3 and A1)
Its classification label (Top Secret - Secret or confidential)
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
4. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
C1
security protection mechanisms
B3
Absolute addresses
5. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
B2
Thrashing
Sensitivity labels
Enforces the rules
6. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Examples of Layered Operating Systems
Reduced Instruction Set Computers (RISC)
Assigned labels
Security rating B
7. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Indexed addressing
First evaluation class
The Strong star property rule
B2
8. In the Bell-LaPadula Model the Object's Label contains ___________________.
Subject to Object Model
Its classification label (Top Secret - Secret or confidential)
Invocation Property
A Domain
9. Simpler instructions that require fewer clock cycles to execute.
Need-to-know
Orange Book - B3
Reduced Instruction Set Computers (RISC)
Access Matrix model
10. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Administrative declaration
The Trusted Computing Base (TCB)
attributability
11. The Physical memory address that the CPU uses
C2
C2 - Controlled Access Protection
Stored in Reak Memory
Absolute addresses
12. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Life Cycle Assurance Requirement
Isolate processes
Protection Rings Support
*-Integrity Axiom
13. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Multilevel Security Policies
Buffer (temporary data storage area)
Mandatory access control
Clark-Wilson Model
14. TCB contains The Security Kernel and all ______________.
B1 - Labeled Security rating
Reduced Instruction Set Computers (RISC)
security protection mechanisms
Primary storage
15. The combination of RAM - Cache and the Processor Registers
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Constrained
Primary storage
The Integrity of data within applications
16. What is called the formal acceptance of the adequacy of a system's overall security by management?
Accreditation
C1
Overt channel
C2 - Controlled Access Protection
17. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
B2 rating
Orange Book - B1
D
The Common Criteria
18. A domain of trust that shares a single security policy and single management
Scalar processors
Security rating B
A security domain
Be protected from modification
19. Trusted facility management is an assurance requirement only for ________________.
Clark-Wilson Model
Highly secure systems (B2 - B3 and A1)
Certification
A1
20. Used by Windows systems to reserve the "Swap Space"
Security Policy
The Thread (memory Management)
Controls the checks
Pagefile.sys file
21. Permits a database to have two records that are identical except for Their classifications
Polyinstantiation
Trusted Distribution
Implement software or systems in a production environment
A lattice of Intergrity Levels
22. All users have a clearance for and a formal need to know about - all data processed with the system.
Absolute addresses
Dedicated Security Mode
Enforces the rules
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
23. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
B3 - Rating
Trusted Distribution
Need-to-know
Orange Book interpretations
24. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
A Thread
Examples of Layered Operating Systems
Swap Space
B3 - Rating
25. A type of memory used for High-speed writing and reading activities.
Totality of protection mechanisms
A lattice of Intergrity Levels
Attributable data
Cache Memory
26. A system uses the Reference Monitor to ___________________ of a subject and an object?
Integrity
Security rating B
Compare the security labels
Totality of protection mechanisms
27. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Dedicated Security Mode
The National Computer Security Center (NCSC)
Division C - Discretionary Protection
B2 rating
28. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
A Domain
The TCSEC - Aka Orange Book
B2
The Red Book
29. Each data object must contain a classification label and each subject must have a clearance label.
B1 - Labeled Security
TCB (Trusted Computing Base)
Dedicated Security Mode
The reference monitor
30. The Availability - Integrity and confidentiality requirements of multitasking operating systems
The National Computer Security Center (NCSC)
Division D - Minimal Protection
Complex Instruction Set Computers (CISC)
Protection Rings Support
31. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
C2 - Controlled Access Protection
C2
State machine model
International Standard 15408
32. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
The Rule is talking about writing
Multiprocessing
Simple Security Rule
Bell-LaPadula Model
33. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Access control to the objects by the subjects
Security Policy is clearly defined and documented
Isolate processes
In C2 - Controlled Access Protection environment
34. Audit data must be captured and protected to enforce accountability
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
No read up
Accountability - Orange Book
Bell-LaPadula Model
35. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
Virtual Memory
The security perimeter
C2
NOT Integrity
36. When the address location that is specified in the program instruction contains the address of the final desired location.
The Trusted Computing Base (TCB)
Implement software or systems in a production environment
Stored in Reak Memory
Indirect addressing
37. What access control technique is also known as multilevel security?
Absolute addresses
B3 - Rating
The Clark Wilson integrity model
Mandatory access control
38. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
Orange Book - D
Files - directories and devices
The Monolithic Operation system Architecture
The rule is talking about "Reading"
39. Users need to be Identified individually to provide more precise acces control and auditing functionality.
The Security Kernel
B3 - Security Domains
Life Cycle Assurance Requirement
C2 - Controlled Access Protection
40. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
Enforces the rules
A security kernel
Indexed addressing
Totality of protection mechanisms
41. Contains the beginning address
*-Integrity Axiom
Orange Book - B2
Its Clearance Label (Top Secret - Secret - or Confidential)
A Base Register (Memory Management)
42. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Succesfully Evaluated products are placed on?
Overt channel
The Evaluated Products List (EPL) with their corresponding rating
Complex Instruction Set Computers (CISC)
Highly secure systems (B2 - B3 and A1)
44. When a portion of primary memory is accessed by specifying the actual address of the memory location
Prohibits
Thrashing
Direct addressing
Orange Book B
45. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Programmable Read-Only Memory (PROM)
Trusted Distribution
The "No write Down" Rule
Most commonly used approach
46. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
A1
The security kernel
Division B - Mandatory Protection Architecture
Controlling unauthorized downgrading of information
47. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Programmable Read-Only Memory (PROM)
The Red Book
Attributable - original - accurate - contemporaneous and legible
Process isolation
48. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Overt channel
C2
A1
Orange Book - A1
49. The assignment of a specific individual to administer the security-related functions of a system.
A Limit Register (Memory Management)
B1 - Labeled Security rating
Trusted facility management
The National Computer Security Center (NCSC)
50. Involves sharing the processor amoung all ready processes
Integrity
Implement software or systems in a production environment
Absolute addresses
Multitasking