Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






2. The Indexed memory addresses that software uses






3. The security kernel is the mechanism that _____________ of the reference monitor concept.






4. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






5. The assignment of a specific individual to administer the security-related functions of a system.






6. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






7. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






8. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






9. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






10. The Policy must be explicit and well defined and enforced by the mechanisms within the system






11. TCB contains The Security Kernel and all ______________.






12. Contains an Address of where the instruction and dara reside that need to be processed.






13. System Architecture that separates system functionality into Hierarchical layers






14. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






15. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






16. Contains the ending address






17. The Security Model Incorporates the ____________ that should be enforced in the system.






18. Each data object must contain a classification label and each subject must have a clearance label.






19. The Simple Security rule is refered to as______________.






20. The Bell-LaPadula model Subjects and Objects are ___________.






21. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






22. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






23. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






24. The *-Property rule is refered to as ____________.






25. The combination of RAM - Cache and the Processor Registers






26. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






27. Which TCSEC level first addresses object reuse?






28. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






29. Subjects and Objects cannot change their security levels once they have been instantiated (created)






30. What access control technique is also known as multilevel security?






31. When the RAM and secondary storage are combined the result is __________.






32. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






33. Simpler instructions that require fewer clock cycles to execute.






34. Based on a known address with an offset value applied.






35. Which can be used as a covert channel?






36. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






37. What does the Clark-Wilson security model focus on






38. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






39. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






40. Remaining parts of the operating system






41. Which uses Protection Profiles and Security Targets?






42. What is called the formal acceptance of the adequacy of a system's overall security by management?






43. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






44. Audit data must be captured and protected to enforce accountability






45. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


46. Which is a straightforward approach that provides access rights to subjects for objects?






47. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






48. Data in Cache can be accessed much more quickly than Data






49. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






50. Mandatory Access requires that _____________ be attached to all objects.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests