Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






2. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






3. Minimal Security






4. Operating System Kernel






5. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






6. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






7. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






8. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






9. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






10. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






11. Documentation must be provided - including test - design - and specification document - user guides and manuals






12. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






13. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






14. A set of objects that a subject is able to access






15. Which would be designated as objects on a MAC system?






16. The Simple Security rule is refered to as______________.






17. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






18. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. Trusted facility management is an assurance requirement only for ________________.






20. Subjects and Objects cannot change their security levels once they have been instantiated (created)






21. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






22. Discretionary protection






23. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






24. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






25. Each data object must contain a classification label and each subject must have a clearance label.






26. Can be erased - modified and upgraded.






27. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






28. Should always trace to individuals responsible for observing and recording the data






29. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






30. When a portion of primary memory is accessed by specifying the actual address of the memory location






31. What prevents a process from accessing another process' data?






32. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






33. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






34. What does the simple security (ss) property mean in the Bell-LaPadula model?






35. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






36. The Reserved hard drive space used to to extend RAM capabilites.






37. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






38. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






39. Involves sharing the processor amoung all ready processes






40. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






41. Which increases the performance in a computer by overlapping the steps of different instructions?






42. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






43. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






44. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






45. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






46. The Indexed memory addresses that software uses






47. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






48. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






49. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






50. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.