SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Subjects and Objects cannot change their security levels once they have been instantiated (created)
All Mandatory Access Control (MAC) systems
Orange Book - A1
B3
The Tranqulity principle (The Bell-LaPadula Model)
2. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Life-cycle assurance - O/B
Overt channel
Buffer (temporary data storage area)
Controlling unauthorized downgrading of information
3. What does the simple integrity axiom mean in the Biba model?
The Biba Model
C2
No read down
C2 - Controlled Access Protection
4. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
An abstract machine
Security Policy - Orange Book
The Trusted Computing Base (TCB)
A lattice of Intergrity Levels
5. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
A Limit Register (Memory Management)
Labels - Orange Book
The security kernel
C1 - Discretionary Security Protection
6. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Administrative declaration
Access control to the objects by the subjects
Real storage
Dominate the object's sensitivity label
7. Which TCSEC level first addresses object reuse?
B1
'Dominate'
Pipelining
C2
8. When a vendor submits a product for evaluation - it submits it to the ____________.
Prohibits
Life Cycle Assurance Requirement
Ring 0
The National Computer Security Center (NCSC)
9. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
The Security Kernel
Orange Book - B3
All Mandatory Access Control (MAC) systems
Implement software or systems in a production environment
10. When a portion of primary memory is accessed by specifying the actual address of the memory location
Most commonly used approach
Orange Book B
Direct addressing
The "No write Down" Rule
11. What prevents a process from accessing another process' data?
Security mechanisms and evalautes their effectivenes
Virtual storage
Security Policy is clearly defined and documented
Process isolation
12. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Higher or equal to access class
Orange Book A
Highly secure systems (B2 - B3 and A1)
Disclosure of residual data
13. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Orange Book - B3
Multilevel Security Policies
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Continuous protection - O/B
14. Which increases the performance in a computer by overlapping the steps of different instructions?
Indexed addressing
Firmware
Pipelining
B3
15. Trusted facility management is an assurance requirement only for ________________.
The reference monitor
Highly secure systems (B2 - B3 and A1)
Isolate processes
Mandatory Access Control (MAC)
16. Audit data must be captured and protected to enforce accountability
Access control to the objects by the subjects
The trustworthiness of an information system
Accountability - Orange Book
Division D - Minimal Protection
17. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Labels - Orange Book
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Buffer overflows
C2
18. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Dedicated Security Mode
The Rule is talking about writing
Simple Security Rule
B1
19. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Orange Book ratings
Life Cycle Assurance Requirement
Accreditation
In C2 - Controlled Access Protection environment
20. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
No write down
Swap Space
International Standard 15408
Security mechanisms and evalautes their effectivenes
21. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
Need-to-know
All Mandatory Access Control (MAC) systems
A Base Register (Memory Management)
Access Matrix model
22. When a computer uses more than one CPU in parallel to execute instructions is known as?
Invocation Property
Mandatory access control
security protection mechanisms
Multiprocessing
23. Succesfully Evaluated products are placed on?
Controlling unauthorized downgrading of information
The Evaluated Products List (EPL) with their corresponding rating
Prohibits
B2
24. Based on a known address with an offset value applied.
Accountability - Orange Book
Mandatory Access Control (MAC)
A lattice of Intergrity Levels
Relative Addresses
25. Applications and user activity
Ring 3
Physical security
Subject to Object Model
D
26. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
The Rule is talking about writing
Orange Book - B2
B2 rating
Orange Book interpretations
28. The Simple Security rule is refered to as______________.
Direct addressing
Enforces the rules
The "No read Up" rule
Real storage
29. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Totality of protection mechanisms
Trusted facility management
An abstract machine
A1
30. Which uses Protection Profiles and Security Targets?
'Dominate'
C2 - Controlled Access Protection
International Standard 15408
Highly secure systems (B2 - B3 and A1)
31. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
A1
attributability
Pipelining
Dedicated Security Mode
32. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
The Biba Model
Relative Addresses
B3
First evaluation class
33. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
A security domain
Firmware
Security Policy - Orange Book
Division B - Mandatory Protection
34. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Physical security
Administrative declaration
Security rating B
Higher or equal to access class
35. A subject at a given clearance may not read an object at a higher classification
Buffer overflows
attributability
Controlling unauthorized downgrading of information
The Simple Security Property
36. What model use an access control triples and requires that the system maintain separation of duty ?
Scalar processors
Mandatory Access Control (MAC)
Clark-Wilson
Storage and timing
37. The Security Model Incorporates the ____________ that should be enforced in the system.
Controls the checks
The Clark Wilson integrity model
Programmable Read-Only Memory (PROM)
Security Policy
38. The Bell-LaPadula model Subjects and Objects are ___________.
Programmable Read-Only Memory (PROM)
Assigned labels
Orange Book - D
Multiprocessing
39. Involves sharing the processor amoung all ready processes
Logical addresses
Multitasking
Labels - Orange Book
Highly secure systems (B2 - B3 and A1)
40. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
The rule is talking about "Reading"
Dominate the object's sensitivity label
The Evaluated Products List (EPL) with their corresponding rating
NOT Integrity
42. Intended for environments that require systems to handle classified data.
The *-Property rule (Star property)
B1 - Labeled Security rating
Orange Book - D
Security rating B
43. Individual subjects must be uniquely identified.
Higher or equal to access class
Administrative declaration
Identification - Orange Book
Implement software or systems in a production environment
44. A system uses the Reference Monitor to ___________________ of a subject and an object?
Clark-Wilson Model
C1
Division D - Minimal Protection
Compare the security labels
45. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
The Strong star property rule
Continuous protection - O/B
Clark-Wilson
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
46. The combination of RAM - Cache and the Processor Registers
Security Policy is clearly defined and documented
An abstract machine
Documentation - Orange Book
Primary storage
47. The Indexed memory addresses that software uses
Orange Book - B3
Physical security
security protection mechanisms
Logical addresses
48. The security kernel is the mechanism that _____________ of the reference monitor concept.
Highly secure systems (B2 - B3 and A1)
Enforces the rules
A Domain
The Rule is talking about writing
49. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Implement software or systems in a production environment
Operational assurance requirements
Orange Book A
Division D - Minimal Protection
50. Which in the Orange Book ratings represents the highest level of trust?
NOT Integrity
A single classification and a Compartment Set
B2
B3