Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






2. Permits a database to have two records that are identical except for Their classifications






3. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






4. In the Bell-LaPadula Model the Object's Label contains ___________________.






5. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






6. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






7. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






8. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






9. A domain of trust that shares a single security policy and single management






10. Mediates all access and Functions between subjects and objects.






11. Mandatory Protection






12. The Orange book does NOT Cover ________________ - And Database management systems






13. The Bell-LaPadula model Subjects and Objects are ___________.






14. What does the simple security (ss) property mean in the Bell-LaPadula model?






15. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






16. Applications and user activity






17. Which increases the performance in a computer by overlapping the steps of different instructions?






18. Subjects and Objects cannot change their security levels once they have been instantiated (created)






19. A set of objects that a subject is able to access






20. Succesfully Evaluated products are placed on?






21. Access control labels must be associated properly with objects.






22. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






23. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






24. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






25. The Reserved hard drive space used to to extend RAM capabilites.






26. Which TCSEC level first addresses object reuse?






27. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






28. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






29. The group that oversees the processes of evaluation within TCSEC is?






30. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






31. As per FDA data should be ______________________________.






32. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






33. When a computer uses more than one CPU in parallel to execute instructions is known as?






34. Used by Windows systems to reserve the "Swap Space"






35. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






36. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






37. Involves sharing the processor amoung all ready processes






38. The subject must have Need to Know for ONLY the information they are trying to access.






39. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






40. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






41. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






42. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






43. In the Bell-LaPadula Model the Subject's Label contains ___________________.






44. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






45. Audit data must be captured and protected to enforce accountability






46. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






47. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






48. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






49. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






50. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?