SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Succesfully Evaluated products are placed on?
The Evaluated Products List (EPL) with their corresponding rating
Orange Book ratings
Trusted facility management
First evaluation class
2. The Reserved hard drive space used to to extend RAM capabilites.
B3
Swap Space
Logical addresses
security protection mechanisms
3. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Orange Book B
C1
D
First evaluation class
4. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
A Limit Register (Memory Management)
NOT Integrity
Higher or equal to access class
A1 - Rating
5. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
The Clark Wilson integrity model
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Totality of protection mechanisms
Orange Book interpretations
6. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Models concerned with integrity
B3
Simple Integrity Axiom
The Red Book
7. Mediates all access and Functions between subjects and objects.
Swap Space
The Monolithic Operation system Architecture
B1
The Security Kernel
8. What does the * (star) property mean in the Bell-LaPadula model?
International Standard 15408
Protection Rings Support
The security perimeter
No write down
9. Individual subjects must be uniquely identified.
Division D - Minimal Protection
The Monolithic Operation system Architecture
Trusted facility management
Identification - Orange Book
10. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
No write down
Sensitivity labels
Simple Security Rule
The security perimeter
11. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Documentation must be provided - including test - design - and specification document - user guides and manuals
Documentation - Orange Book
The National Computer Security Center (NCSC)
Security rating B
A Thread
13. Which describe a condition when RAM and Secondary storage are used together?
Multitasking
Evaluated separately
Virtual storage
Orange Book interpretations
14. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Need-to-know
Erasable and Programmable Read-Only Memory (EPROM)
Controls the checks
Subject to Object Model
15. When a computer uses more than one CPU in parallel to execute instructions is known as?
B1
Multiprocessing
Isolate processes
A Domain
16. Each data object must contain a classification label and each subject must have a clearance label.
Assigned labels
The Clark Wilson integrity model
A1
B1 - Labeled Security
17. The *-Property rule is refered to as ____________.
B3 - Rating
The "No write Down" Rule
Division C - Discretionary Protection
Mandatory access control
18. Simpler instructions that require fewer clock cycles to execute.
All Mandatory Access Control (MAC) systems
Trusted Products Evaluation Program (TPEP)
NOT Integrity
Reduced Instruction Set Computers (RISC)
19. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
The Red Book
NOT Integrity
Security mechanisms and evalautes their effectivenes
C2 - Controlled Access Protection
20. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Clark-Wilson
A security domain
Certification
Orange Book - B2
21. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Ring 1
B2 - Structured Protection
Trusted hardware - Software and Firmware
Constrained
22. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Orange Book - D
An abstract machine
Secondary Storage
C2
23. The total combination of protection mechanisms within a computer system
TCB (Trusted Computing Base)
Orange Book - B1
Covert channels
Programmable Read-Only Memory (PROM)
24. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
A1 - Rating
The Tranqulity principle (The Bell-LaPadula Model)
B1
State machine model
25. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
International Standard 15408
Implement software or systems in a production environment
B3 - Security Domains
Simple Integrity Axiom
26. What does the simple integrity axiom mean in the Biba model?
The reference monitor
No read down
The Biba Model
Types of covert channels
27. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Execution Domain
B2 - Structured Protection
C2
Mandatory access control
28. What is called the formal acceptance of the adequacy of a system's overall security by management?
The Tranqulity principle (The Bell-LaPadula Model)
security protection mechanisms
Accreditation
TCB (Trusted Computing Base)
29. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Orange Book - B1
The Thread (memory Management)
Bell-LaPadula Model
Security rating B
30. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
The Thread (memory Management)
Overt channel
A Base Register (Memory Management)
A lattice of Intergrity Levels
31. Contains the ending address
A Limit Register (Memory Management)
Basic Security Theorem (used in computer science) definition
Its classification label (Top Secret - Secret or confidential)
Government and military applications
32. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Certification
Buffer overflows
Orange Book - A1
Trusted Products Evaluation Program (TPEP)
33. In the Bell-LaPadula Model the Subject's Label contains ___________________.
NOT Integrity
Its Clearance Label (Top Secret - Secret - or Confidential)
The Security Kernel
A and B
34. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
B2 - Structured Protection
Overt channel
Division B - Mandatory Protection Architecture
B3 - Rating
35. When a portion of primary memory is accessed by specifying the actual address of the memory location
The *-Property rule (Star property)
Constrained
A Thread
Direct addressing
36. The Bell-LaPadula model Subjects and Objects are ___________.
A Layered Operating System Architecure
Assigned labels
The trustworthiness of an information system
Documentation - Orange Book
37. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Secondary Storage
The National Computer Security Center (NCSC)
B2 rating
Overt channel
38. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
Identification - Orange Book
The security perimeter
Need-to-know
The Thread (memory Management)
39. Data in Cache can be accessed much more quickly than Data
'Dominate'
Orange Book interpretations
Stored in Reak Memory
Most commonly used approach
40. The Policy must be explicit and well defined and enforced by the mechanisms within the system
No write down
Security Policy - Orange Book
Trusted Products Evaluation Program (TPEP)
Division C - Discretionary Protection
41. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
No write down
Administrative declaration
B2 rating
Protection Rings Support
42. What does the Clark-Wilson security model focus on
Integrity
Ring 3
Higher or equal to access class
B3
43. When the contents of the address defined in the program's instruction is added to that of an index register.
Indexed addressing
International Standard 15408
Programmable Read-Only Memory (PROM)
Orange Book A
44. Which in the Orange Book ratings represents the highest level of trust?
Division B - Mandatory Protection Architecture
B2
Compare the security labels
Cache Memory
45. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
The Security Kernel
The Simple Security Property
Security Policy is clearly defined and documented
C2 - Controlled Access Protection
46. Based on a known address with an offset value applied.
Relative Addresses
A Limit Register (Memory Management)
Trusted Distribution
A single classification and a Compartment Set
47. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
B1 - Labeled Security
C2 - Controlled Access Protection
B3
Buffer (temporary data storage area)
48. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Security Policy is clearly defined and documented
In C2 - Controlled Access Protection environment
Clark-Wilson Model
Controlling unauthorized downgrading of information
49. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
C2
Accountability - Orange Book
Cache Memory
50. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
B1 - Labeled Security rating
Overt channel
The TCSEC - Aka Orange Book
Trusted Distribution