Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Succesfully Evaluated products are placed on?






2. The Reserved hard drive space used to to extend RAM capabilites.






3. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






4. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






5. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






6. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






7. Mediates all access and Functions between subjects and objects.






8. What does the * (star) property mean in the Bell-LaPadula model?






9. Individual subjects must be uniquely identified.






10. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






11. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Documentation must be provided - including test - design - and specification document - user guides and manuals






13. Which describe a condition when RAM and Secondary storage are used together?






14. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






15. When a computer uses more than one CPU in parallel to execute instructions is known as?






16. Each data object must contain a classification label and each subject must have a clearance label.






17. The *-Property rule is refered to as ____________.






18. Simpler instructions that require fewer clock cycles to execute.






19. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






20. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






21. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






22. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






23. The total combination of protection mechanisms within a computer system






24. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






25. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






26. What does the simple integrity axiom mean in the Biba model?






27. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






28. What is called the formal acceptance of the adequacy of a system's overall security by management?






29. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






30. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






31. Contains the ending address






32. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






33. In the Bell-LaPadula Model the Subject's Label contains ___________________.






34. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






35. When a portion of primary memory is accessed by specifying the actual address of the memory location






36. The Bell-LaPadula model Subjects and Objects are ___________.






37. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






38. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






39. Data in Cache can be accessed much more quickly than Data






40. The Policy must be explicit and well defined and enforced by the mechanisms within the system






41. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






42. What does the Clark-Wilson security model focus on






43. When the contents of the address defined in the program's instruction is added to that of an index register.






44. Which in the Orange Book ratings represents the highest level of trust?






45. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






46. Based on a known address with an offset value applied.






47. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






48. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






49. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






50. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?