Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






2. Which uses Protection Profiles and Security Targets?






3. What prevents a process from accessing another process' data?






4. Minimal Security






5. Succesfully Evaluated products are placed on?






6. Contains the beginning address






7. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






8. TCSEC provides a means to evaluate ______________________.






9. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






10. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






11. Simpler instructions that require fewer clock cycles to execute.






12. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






13. A type of memory used for High-speed writing and reading activities.






14. In the Bell-LaPadula Model the Subject's Label contains ___________________.






15. Applications and user activity






16. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






17. Mandatory Access requires that _____________ be attached to all objects.






18. Involves sharing the processor amoung all ready processes






19. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






20. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






21. Which TCSEC level first addresses object reuse?






22. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






23. When a computer uses more than one CPU in parallel to execute instructions is known as?






24. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






25. What does the simple security (ss) property mean in the Bell-LaPadula model?






26. I/O drivers and utilities






27. What are the components of an object's sensitivity label?






28. Mediates all access and Functions between subjects and objects.






29. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






30. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






31. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






32. The Security Model Incorporates the ____________ that should be enforced in the system.






33. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






34. Trusted facility management is an assurance requirement only for ________________.






35. What does the simple integrity axiom mean in the Biba model?






36. Discretionary protection






37. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






38. Users need to be Identified individually to provide more precise acces control and auditing functionality.






39. Access control labels must be associated properly with objects.






40. The Physical memory address that the CPU uses






41. What access control technique is also known as multilevel security?






42. System Architecture that separates system functionality into Hierarchical layers






43. What model use an access control triples and requires that the system maintain separation of duty ?






44. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






45. TCB contains The Security Kernel and all ______________.






46. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






47. When the contents of the address defined in the program's instruction is added to that of an index register.






48. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






49. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






50. When the address location that is specified in the program instruction contains the address of the final desired location.