SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
The "No read Up" rule
The TCSEC - Aka Orange Book
Orange Book ratings
C1 - Discretionary Security Protection
2. In access control terms - the word "dominate" refers to ___________.
Government and military applications
The security kernel
Prohibits
Higher or equal to access class
3. When a portion of primary memory is accessed by specifying the actual address of the memory location
Direct addressing
Multiprocessing
The trustworthiness of an information system
Continuous protection - O/B
4. Permits a database to have two records that are identical except for Their classifications
Firmware
Swap Space
Polyinstantiation
A security kernel
5. The Orange book does NOT Cover ________________ - And Database management systems
The security perimeter
Networks and Communications
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The Integrity of data within applications
6. The Simple Security rule is refered to as______________.
Need-to-know
Process isolation
Continuous protection - O/B
The "No read Up" rule
7. When a computer uses more than one CPU in parallel to execute instructions is known as?
B3
Multiprocessing
Examples of Layered Operating Systems
Clark-Wilson Model
8. The assignment of a specific individual to administer the security-related functions of a system.
Trusted facility management
State machine model
Real storage
C1 - Discrection Security Protection is a type of environment
9. The Bell-LaPadula model Subjects and Objects are ___________.
An abstract machine
Identification - Orange Book
Assigned labels
Security Policy
10. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
B2 - Structured Protection
Orange Book - A1
Basic Security Theorem (used in computer science) definition
A lattice of Intergrity Levels
11. Contains an Address of where the instruction and dara reside that need to be processed.
The Clark Wilson integrity model
Covert channels
Isolate processes
The Thread (memory Management)
12. Which can be used as a covert channel?
Documentation - Orange Book
Storage and timing
Integrity
Clark-Wilson Model
13. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Orange Book - B2
B2 rating
Stored in Reak Memory
Totality of protection mechanisms
14. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Orange Book ratings
B1 - Labeled Security
Attributable - original - accurate - contemporaneous and legible
B1
15. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
B3
*-Integrity Axiom
Multilevel Security Policies
Ring 0
16. The Bell-LaPadula Model is a _______________.
Assigned labels
An abstract machine
Buffer overflows
Subject to Object Model
17. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. As per FDA data should be ______________________________.
Protection Rings Support
Attributable - original - accurate - contemporaneous and legible
The Thread (memory Management)
Storage and timing
19. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
C2
Need-to-know
The *-Property rule (Star property)
Programmable Read-Only Memory (PROM)
20. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Execution Domain
Multiprocessing
A security domain
C1 - Discretionary Security Protection
21. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
security protection mechanisms
Orange Book C
Buffer (temporary data storage area)
Constrained
22. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Security rating B
Pipelining
Administrative declaration
Invocation Property
23. The Reserved hard drive space used to to extend RAM capabilites.
B2
Swap Space
security protection mechanisms
C2 - Controlled Access Protection
24. What does the simple integrity axiom mean in the Biba model?
D
Fail safe
The security perimeter
No read down
25. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Covert channels
Constrained
First evaluation class
Virtual Memory
26. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
Integrity
Orange Book interpretations
In C2 - Controlled Access Protection environment
No read up
27. Happen because input data is not checked for appropriate length at time of input
Enforces the rules
Dedicated Security Mode
Buffer overflows
Security Policy
28. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Continuous protection - O/B
Life-cycle assurance - O/B
A security kernel
An abstract machine
29. Verification Protection
Controlling unauthorized downgrading of information
The reference monitor
Orange Book A
System High Security Mode
30. Applications and user activity
Ring 3
Evaluated separately
Certification
Real storage
31. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Implement software or systems in a production environment
Division B - Mandatory Protection
Models concerned with integrity
The Strong star property rule
32. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
TCB (Trusted Computing Base)
Orange Book - B1
A Limit Register (Memory Management)
D
33. Which uses Protection Profiles and Security Targets?
C2 - Controlled Access Protection
Operational assurance requirements
C2 - Controlled Access Protection
International Standard 15408
34. Trusted facility management is an assurance requirement only for ________________.
Trusted Network Interpretation (TNI)
Covert channels
Highly secure systems (B2 - B3 and A1)
Discretionary Security Property (ds-property)
35. Which TCSEC level first addresses object reuse?
Access Matrix model
Orange Book - B3
C2
Bell-LaPadula Model
36. What access control technique is also known as multilevel security?
Secondary Storage
The Red Book
Mandatory access control
Trusted hardware - Software and Firmware
37. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Access control to the objects by the subjects
System High Security Mode
Ring 1
security protection mechanisms
38. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Thrashing
The TCSEC - Aka Orange Book
Implement software or systems in a production environment
Orange Book - A1
39. Which is an ISO standard product evaluation criteria that supersedes several different criteria
The Common Criteria
The Strong star property rule
Integrity
The TCSEC - Aka Orange Book
40. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
Integrity
Orange Book - D
Pipelining
Basic Security Theorem (used in computer science) definition
41. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
The National Computer Security Center (NCSC)
A1 - Rating
Ring 2
Pagefile.sys file
42. A Policy based control. All objects and systems have a sensitivity level assigned to them
Examples of Layered Operating Systems
Mandatory Access Control (MAC)
Trusted facility management
Physical security
43. The subject must have Need to Know for ONLY the information they are trying to access.
Highly secure systems (B2 - B3 and A1)
The security perimeter
Enforces the rules
System High Security Mode
44. Each data object must contain a classification label and each subject must have a clearance label.
The Strong star property rule
B1 - Labeled Security
Orange Book - B2
In C2 - Controlled Access Protection environment
45. The C2 evaluation class of the _________________ offers controlled access protection.
Trusted Network Interpretation (TNI)
Constrained
Bell-LaPadula Model
C1 - Discretionary Security Protection
46. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
The Tranqulity principle (The Bell-LaPadula Model)
Constrained
Storage and timing
Discretionary Security Property (ds-property)
47. Which increases the performance in a computer by overlapping the steps of different instructions?
C2 - Controlled Access Protection
Most commonly used approach
Pipelining
The "No write Down" Rule
48. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Absolute addresses
Assigned labels
Bell-LaPadula Model
Orange Book - A1
49. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
A Layered Operating System Architecure
Trusted hardware - Software and Firmware
The *-Property rule (Star property)
Accountability - Orange Book
50. Mandatory Protection
Orange Book B
Access control to the objects by the subjects
Fail safe
NOT Integrity