Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






2. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






3. In the Bell-LaPadula Model the Object's Label contains ___________________.






4. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






5. Documentation must be provided - including test - design - and specification document - user guides and manuals






6. What does the * (star) property mean in the Bell-LaPadula model?






7. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






8. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






9. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






10. When the address location that is specified in the program instruction contains the address of the final desired location.






11. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






12. The Availability - Integrity and confidentiality requirements of multitasking operating systems






13. The assignment of a specific individual to administer the security-related functions of a system.






14. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






15. TCSEC provides a means to evaluate ______________________.






16. The C2 evaluation class of the _________________ offers controlled access protection.






17. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






18. A subject at a given clearance may not read an object at a higher classification






19. Which describe a condition when RAM and Secondary storage are used together?






20. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






21. Permits a database to have two records that are identical except for Their classifications






22. Should always trace to individuals responsible for observing and recording the data






23. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






24. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






25. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






26. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






27. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






28. A system uses the Reference Monitor to ___________________ of a subject and an object?






29. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






30. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






31. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






32. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






33. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






34. The TCB is the ________________ within a computer system that work together to enforce a security policy.






35. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






36. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






37. The Orange book requires protection against two_____________ - which are these Timing and Storage






38. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






39. As per FDA data should be ______________________________.






40. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






41. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






42. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






43. What access control technique is also known as multilevel security?






44. Trusted facility management is an assurance requirement only for ________________.






45. I/O drivers and utilities






46. Another word for Primary storage and distinguishes physical memory from virtual memory.






47. Which increases the performance in a computer by overlapping the steps of different instructions?






48. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






49. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






50. Can be erased - modified and upgraded.