Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






2. In the Bell-LaPadula Model the Subject's Label contains ___________________.






3. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






4. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






5. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






6. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






7. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






8. The TCB is the ________________ within a computer system that work together to enforce a security policy.






9. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






10. In the Bell-LaPadula Model the Object's Label contains ___________________.






11. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






12. Data in Cache can be accessed much more quickly than Data






13. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






14. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






15. The assignment of a specific individual to administer the security-related functions of a system.






16. When a portion of primary memory is accessed by specifying the actual address of the memory location






17. Permits a database to have two records that are identical except for Their classifications






18. Used by Windows systems to reserve the "Swap Space"






19. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






20. The C2 evaluation class of the _________________ offers controlled access protection.






21. TCSEC provides a means to evaluate ______________________.






22. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






23. Mandatory access control is enfored by the use of security labels.






24. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






25. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






26. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






27. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






28. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Subjects and Objects cannot change their security levels once they have been instantiated (created)






30. As per FDA data should be ______________________________.






31. Which can be used as a covert channel?






32. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






33. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






34. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






35. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






36. Contains the beginning address






37. Another word for Primary storage and distinguishes physical memory from virtual memory.






38. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






39. Involves sharing the processor amoung all ready processes






40. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






41. All users have a clearance for and a formal need to know about - all data processed with the system.






42. The combination of RAM - Cache and the Processor Registers






43. The Security Model Incorporates the ____________ that should be enforced in the system.






44. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






45. Which would be designated as objects on a MAC system?






46. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






47. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


48. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






49. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






50. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests