Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






2. Users need to be Identified individually to provide more precise acces control and auditing functionality.






3. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






4. Operating System Kernel






5. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






6. In the Bell-LaPadula Model the Object's Label contains ___________________.






7. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






8. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






9. Individual subjects must be uniquely identified.






10. Based on a known address with an offset value applied.






11. Mediates all access and Functions between subjects and objects.






12. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






13. The *-Property rule is refered to as ____________.






14. What does the simple security (ss) property mean in the Bell-LaPadula model?






15. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






16. What model use an access control triples and requires that the system maintain separation of duty ?






17. Involves sharing the processor amoung all ready processes






18. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






19. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






20. Which increases the performance in a computer by overlapping the steps of different instructions?






21. The Biba Model adresses _____________________.






22. The C2 evaluation class of the _________________ offers controlled access protection.






23. Remaining parts of the operating system






24. When a portion of primary memory is accessed by specifying the actual address of the memory location






25. A domain of trust that shares a single security policy and single management






26. Which is an ISO standard product evaluation criteria that supersedes several different criteria






27. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






28. The security kernel is the mechanism that _____________ of the reference monitor concept.






29. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






30. What does the * (star) property mean in the Bell-LaPadula model?






31. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






32. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






33. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






34. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






35. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






36. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






37. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






38. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






39. System Architecture that separates system functionality into Hierarchical layers






40. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






41. TCSEC provides a means to evaluate ______________________.






42. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






43. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






44. What does the simple integrity axiom mean in the Biba model?






45. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






46. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






47. A system uses the Reference Monitor to ___________________ of a subject and an object?






48. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






49. Audit data must be captured and protected to enforce accountability






50. Which is a straightforward approach that provides access rights to subjects for objects?