Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






2. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






3. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






4. The Indexed memory addresses that software uses






5. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






6. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






7. The Simple Security rule is refered to as______________.






8. The Policy must be explicit and well defined and enforced by the mechanisms within the system






9. Permits a database to have two records that are identical except for Their classifications






10. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






11. Contains the beginning address






12. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






13. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






14. Simpler instructions that require fewer clock cycles to execute.






15. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






16. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






17. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






18. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






19. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






20. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






21. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






22. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






23. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






24. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






26. When the RAM and secondary storage are combined the result is __________.






27. Documentation must be provided - including test - design - and specification document - user guides and manuals






28. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






29. A type of memory used for High-speed writing and reading activities.






30. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






31. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






32. TCB contains The Security Kernel and all ______________.






33. A set of objects that a subject is able to access






34. Users need to be Identified individually to provide more precise acces control and auditing functionality.






35. Contains an Address of where the instruction and dara reside that need to be processed.






36. Discretionary protection






37. Individual subjects must be uniquely identified.






38. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






39. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






40. Used by Windows systems to reserve the "Swap Space"






41. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






42. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






43. Which Orange Book evaluation level is described as "Verified Design"?






44. Remaining parts of the operating system






45. The Availability - Integrity and confidentiality requirements of multitasking operating systems






46. Mediates all access and Functions between subjects and objects.






47. What model use an access control triples and requires that the system maintain separation of duty ?






48. System Architecture that separates system functionality into Hierarchical layers






49. When the contents of the address defined in the program's instruction is added to that of an index register.






50. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.