Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






2. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






3. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






4. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






5. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






6. System Architecture that separates system functionality into Hierarchical layers






7. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






8. What does the * (star) property mean in the Bell-LaPadula model?






9. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






10. Documentation must be provided - including test - design - and specification document - user guides and manuals






11. Which describe a condition when RAM and Secondary storage are used together?






12. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






13. When a vendor submits a product for evaluation - it submits it to the ____________.






14. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






15. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






16. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






17. A Policy based control. All objects and systems have a sensitivity level assigned to them






18. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






19. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






20. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






21. Mediates all access and Functions between subjects and objects.






22. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






23. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






24. Operating System Kernel






25. Access control labels must be associated properly with objects.






26. Which in the Orange Book ratings represents the highest level of trust?






27. The total combination of protection mechanisms within a computer system






28. Permits a database to have two records that are identical except for Their classifications






29. TCSEC provides a means to evaluate ______________________.






30. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






31. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






32. Can be erased - modified and upgraded.






33. The TCB is the ________________ within a computer system that work together to enforce a security policy.






34. The Indexed memory addresses that software uses






35. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






36. What does the simple security (ss) property mean in the Bell-LaPadula model?






37. What is called the formal acceptance of the adequacy of a system's overall security by management?






38. What prevents a process from accessing another process' data?






39. Subjects and Objects cannot change their security levels once they have been instantiated (created)






40. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






41. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






42. Happen because input data is not checked for appropriate length at time of input






43. The subject must have Need to Know for ONLY the information they are trying to access.






44. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






45. In the Bell-LaPadula Model the Subject's Label contains ___________________.






46. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






47. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






48. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






49. Discretionary protection






50. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?