Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






2. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






3. Can be erased - modified and upgraded.






4. Access control labels must be associated properly with objects.






5. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






6. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






7. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






8. Simpler instructions that require fewer clock cycles to execute.






9. What does the simple integrity axiom mean in the Biba model?






10. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






11. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






12. What is called the formal acceptance of the adequacy of a system's overall security by management?






13. In the Bell-LaPadula Model the Object's Label contains ___________________.






14. The Reserved hard drive space used to to extend RAM capabilites.






15. Discretionary protection






16. Operating System Kernel






17. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






18. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






19. Minimal Security






20. When the RAM and secondary storage are combined the result is __________.






21. A domain of trust that shares a single security policy and single management






22. What does the * (star) property mean in the Bell-LaPadula model?






23. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






24. Subjects and Objects cannot change their security levels once they have been instantiated (created)






25. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






26. Data in Cache can be accessed much more quickly than Data






27. What prevents a process from accessing another process' data?






28. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






29. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






30. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






31. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






32. The group that oversees the processes of evaluation within TCSEC is?






33. The Physical memory address that the CPU uses






34. Individual subjects must be uniquely identified.






35. Execute one instruction at a time.






36. The total combination of protection mechanisms within a computer system






37. Which is an ISO standard product evaluation criteria that supersedes several different criteria






38. The combination of RAM - Cache and the Processor Registers






39. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






40. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






41. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






42. Intended for environments that require systems to handle classified data.






43. Used by Windows systems to reserve the "Swap Space"






44. Which is a straightforward approach that provides access rights to subjects for objects?






45. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






46. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






47. Contains the ending address






48. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






49. Each data object must contain a classification label and each subject must have a clearance label.






50. Contains the beginning address