SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Trusted Network Interpretation (TNI)
Orange Book - B2
Life Cycle Assurance Requirement
Orange Book ratings
2. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The Red Book
B1 - Labeled Security
Indexed addressing
Dominate the object's sensitivity label
3. The group that oversees the processes of evaluation within TCSEC is?
Access Matrix model
Trusted Products Evaluation Program (TPEP)
Labels - Orange Book
The Trusted Computing Base (TCB)
4. Applications and user activity
No read up
Bell-LaPadula Model
Storage and timing
Ring 3
5. Happen because input data is not checked for appropriate length at time of input
Orange Book ratings
Ring 1
Buffer overflows
Its classification label (Top Secret - Secret or confidential)
6. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
All Mandatory Access Control (MAC) systems
Continuous protection - O/B
Complex Instruction Set Computers (CISC)
Direct Addressing
7. Remaining parts of the operating system
The Biba Model
Direct addressing
Ring 1
A Domain
8. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
Most commonly used approach
In C2 - Controlled Access Protection environment
Swap Space
A Domain
9. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
A lattice of Intergrity Levels
B2
Polyinstantiation
'Dominate'
10. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Files - directories and devices
The Biba Model
Execution Domain
B2
11. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.
B2 - Structured Protection
Clark-Wilson
Labels - Orange Book
Orange Book - B1
12. Which describe a condition when RAM and Secondary storage are used together?
Invocation Property
Orange Book C
Virtual storage
Sensitivity labels
13. What are the components of an object's sensitivity label?
A single classification and a Compartment Set
D
A and B
B2 rating
14. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Orange Book B
No read up
Prevent secret information from being accessed
The "No write Down" Rule
15. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
All Mandatory Access Control (MAC) systems
Administrative declaration
Division D - Minimal Protection
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
16. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
Access control to the objects by the subjects
*-Integrity Axiom
B3
C2 - Controlled Access Protection
17. When a computer uses more than one CPU in parallel to execute instructions is known as?
Multiprocessing
The security kernel
Erasable and Programmable Read-Only Memory (EPROM)
Integrity
18. A type of memory used for High-speed writing and reading activities.
B3
The rule is talking about "Reading"
Cache Memory
Security Policy
19. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
Security rating B
Subject to Object Model
Trusted facility management
Orange Book - B3
20. Individual subjects must be uniquely identified.
Identification - Orange Book
Evaluated separately
C2 - Controlled Access Protection
Indirect addressing
21. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
Simple Security Rule
B2 - Structured Protection
A Limit Register (Memory Management)
Security Policy - Orange Book
22. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
Its classification label (Top Secret - Secret or confidential)
Ring 2
The Biba Model
Logical addresses
23. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
The Common Criteria
Buffer (temporary data storage area)
Most commonly used approach
The Simple Security Property
24. A system uses the Reference Monitor to ___________________ of a subject and an object?
Access control to the objects by the subjects
Mandatory access control
Attributable data
Compare the security labels
25. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Erasable and Programmable Read-Only Memory (EPROM)
Buffer (temporary data storage area)
Clark-Wilson Model
Overt channel
26. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Division B - Mandatory Protection Architecture
Operational assurance requirements
The Trusted Computing Base (TCB)
The Rule is talking about writing
27. Contains the beginning address
Highly secure systems (B2 - B3 and A1)
A Base Register (Memory Management)
Swap Space
No read up
28. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Division B - Mandatory Protection Architecture
C1 - Discretionary Security Protection
Thrashing
Trusted hardware - Software and Firmware
29. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Ring 0
'Dominate'
A Thread
Security Policy - Orange Book
30. Used by Windows systems to reserve the "Swap Space"
C1 - Discrection Security Protection is a type of environment
Orange Book A
B3
Pagefile.sys file
31. In the Bell-LaPadula Model the Subject's Label contains ___________________.
State machine model
B1 - Labeled Security rating
Mandatory access control
Its Clearance Label (Top Secret - Secret - or Confidential)
32. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Documentation - Orange Book
Indirect addressing
B3
Implement software or systems in a production environment
33. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Orange Book interpretations
Subject to Object Model
Examples of Layered Operating Systems
Ring 0
34. When the RAM and secondary storage are combined the result is __________.
Virtual Memory
C2 - Controlled Access Protection
Security mechanisms and evalautes their effectivenes
Indexed addressing
35. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
Dedicated Security Mode
Orange Book - B3
A security kernel
*-Integrity Axiom
36. Based on a known address with an offset value applied.
The TCSEC - Aka Orange Book
Virtual Memory
Relative Addresses
Division B - Mandatory Protection Architecture
37. Access control labels must be associated properly with objects.
Simple Security Rule
A lattice of Intergrity Levels
Disclosure of residual data
Labels - Orange Book
38. I/O drivers and utilities
Government and military applications
Integrity
All Mandatory Access Control (MAC) systems
Ring 2
39. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
B1 - Labeled Security rating
The Rule is talking about writing
TCB (Trusted Computing Base)
C1 - Discretionary Security Protection
40. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
No read up
Access control to the objects by the subjects
B1 - Labeled Security rating
Swap Space
41. A domain of trust that shares a single security policy and single management
NOT Integrity
Administrative declaration
Bell-LaPadula Model
A security domain
42. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
The National Computer Security Center (NCSC)
The *-Property rule (Star property)
C1 - Discrection Security Protection is a type of environment
Firmware
43. Which can be used as a covert channel?
Storage and timing
Fail safe
Clark-Wilson Model
Direct addressing
44. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The Trusted Computing Base (TCB)
A security domain
Certification
Polyinstantiation
45. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
B3
Evaluated separately
The Integrity of data within applications
Primary storage
46. A Policy based control. All objects and systems have a sensitivity level assigned to them
Attributable data
Implement software or systems in a production environment
Mandatory Access Control (MAC)
*-Integrity Axiom
47. Verification Protection
Orange Book B
Models concerned with integrity
Orange Book A
TCB (Trusted Computing Base)
48. What model use an access control triples and requires that the system maintain separation of duty ?
Life Cycle Assurance Requirement
Clark-Wilson
Orange Book - B1
Ring 3
49. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
Models concerned with integrity
B3
Higher or equal to access class
The security perimeter
50. Which uses Protection Profiles and Security Targets?
Thrashing
International Standard 15408
A1 - Rating
Be protected from modification
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests