SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
C1 - Discrection Security Protection is a type of environment
Highly secure systems (B2 - B3 and A1)
B3 - Rating
Secondary Storage
2. Audit data must be captured and protected to enforce accountability
The *-Property rule (Star property)
Orange Book - A1
Accountability - Orange Book
Trusted Products Evaluation Program (TPEP)
3. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
No read down
B2 - Structured Protection
The rule is talking about "Reading"
International Standard 15408
4. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
A single classification and a Compartment Set
Division B - Mandatory Protection Architecture
Controls the checks
Invocation Property
5. TCB contains The Security Kernel and all ______________.
The Evaluated Products List (EPL) with their corresponding rating
B3
A and B
security protection mechanisms
6. What does the simple security (ss) property mean in the Bell-LaPadula model?
Models concerned with integrity
The *-Property rule (Star property)
No read up
Orange Book - D
7. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
Orange Book - B3
Virtual Memory
The *-Property rule (Star property)
Its classification label (Top Secret - Secret or confidential)
8. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Orange Book interpretations
The security perimeter
Access control to the objects by the subjects
Controlling unauthorized downgrading of information
9. Involves sharing the processor amoung all ready processes
Attributable data
Certification
Multitasking
Absolute addresses
10. Remaining parts of the operating system
Thrashing
No read down
attributability
Ring 1
11. Permits a database to have two records that are identical except for Their classifications
Swap Space
Evaluated separately
The National Computer Security Center (NCSC)
Polyinstantiation
12. All users have a clearance for and a formal need to know about - all data processed with the system.
Ring 3
Accountability - Orange Book
Trusted facility management
Dedicated Security Mode
13. Mediates all access and Functions between subjects and objects.
B3 - Rating
The Security Kernel
An abstract machine
Most commonly used approach
14. Access control labels must be associated properly with objects.
Prevent secret information from being accessed
A Base Register (Memory Management)
The Tranqulity principle (The Bell-LaPadula Model)
Labels - Orange Book
15. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Trusted hardware - Software and Firmware
Access control to the objects by the subjects
The Strong star property rule
Its classification label (Top Secret - Secret or confidential)
16. Verification Protection
Orange Book A
A lattice of Intergrity Levels
Types of covert channels
Primary storage
17. Used by Windows systems to reserve the "Swap Space"
Orange Book - B2
Scalar processors
Pagefile.sys file
Attributable data
18. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
A Base Register (Memory Management)
Accountability - Orange Book
First evaluation class
Orange Book - D
19. The Bell-LaPadula model Subjects and Objects are ___________.
Assigned labels
Stored in Reak Memory
Orange Book - D
C1 - Discrection Security Protection is a type of environment
20. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
A1
Isolate processes
Direct addressing
Programmable Read-Only Memory (PROM)
21. Data in Cache can be accessed much more quickly than Data
Protection Rings Support
Subject to Object Model
Stored in Reak Memory
Programmable Read-Only Memory (PROM)
22. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Polyinstantiation
Certification
The security kernel
Administrative declaration
23. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
The National Computer Security Center (NCSC)
The Clark Wilson integrity model
The Biba Model
Disclosure of residual data
24. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
Orange Book - A1
Multiprocessing
Process isolation
attributability
25. What access control technique is also known as multilevel security?
The Trusted Computing Base (TCB)
Mandatory access control
A single classification and a Compartment Set
Trusted facility management
26. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
International Standard 15408
A1 - Rating
A1
The security kernel
27. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Disclosure of residual data
Security mechanisms and evalautes their effectivenes
The Security Kernel
The Common Criteria
28. When the address location that is specified in the program instruction contains the address of the final desired location.
Indirect addressing
Models concerned with integrity
attributability
B1 - Labeled Security
29. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Which describe a condition when RAM and Secondary storage are used together?
Virtual storage
Direct addressing
Discretionary Security Property (ds-property)
C2 - Controlled Access Protection
31. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Ring 1
Orange Book - A1
Most commonly used approach
Orange Book - B3
32. Each data object must contain a classification label and each subject must have a clearance label.
Orange Book - B3
B1 - Labeled Security
Life-cycle assurance - O/B
Dedicated Security Mode
33. Which would be designated as objects on a MAC system?
The Integrity of data within applications
Erasable and Programmable Read-Only Memory (EPROM)
Files - directories and devices
Mandatory Access Control (MAC)
34. Execute one instruction at a time.
Examples of Layered Operating Systems
Swap Space
The Trusted Computing Base (TCB)
Scalar processors
35. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.
The Red Book
Ring 0
Orange Book - B1
Compare the security labels
36. When the RAM and secondary storage are combined the result is __________.
Totality of protection mechanisms
Virtual Memory
Orange Book - B2
Scalar processors
37. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Orange Book interpretations
Evaluated separately
Operational assurance requirements
Government and military applications
38. What is called the formal acceptance of the adequacy of a system's overall security by management?
Accreditation
Division D - Minimal Protection
Identification - Orange Book
A Limit Register (Memory Management)
39. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
Thrashing
Pipelining
B2 rating
The Trusted Computing Base (TCB)
40. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
B2 rating
B3
The security kernel
Orange Book A
41. Should always trace to individuals responsible for observing and recording the data
Polyinstantiation
The TCSEC - Aka Orange Book
Attributable data
The Simple Security Property
42. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
The trustworthiness of an information system
Polyinstantiation
Programmable Read-Only Memory (PROM)
Division D - Minimal Protection
43. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
C2 - Controlled Access Protection
C1 - Discretionary Security Protection
B1 - Labeled Security
Fail safe
44. Mandatory access control is enfored by the use of security labels.
The Simple Security Property
Orange Book - B1
Division B - Mandatory Protection
B3
45. What does the * (star) property mean in the Bell-LaPadula model?
No write down
Access Matrix model
Virtual storage
A1 - Rating
46. Operating System Kernel
Scalar processors
Ring 0
Its classification label (Top Secret - Secret or confidential)
Simple Integrity Axiom
47. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
A Base Register (Memory Management)
The Evaluated Products List (EPL) with their corresponding rating
Accreditation
Complex Instruction Set Computers (CISC)
48. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Covert channels
Multilevel Security Policies
Dedicated Security Mode
Simple Integrity Axiom
49. The Reserved hard drive space used to to extend RAM capabilites.
The reference monitor
Swap Space
B3 - Security Domains
A1 - Rating
50. Based on a known address with an offset value applied.
First evaluation class
The Thread (memory Management)
Relative Addresses
The "No write Down" Rule