SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Succesfully Evaluated products are placed on?
C2
Thrashing
Accountability - Orange Book
The Evaluated Products List (EPL) with their corresponding rating
2. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
Physical security
The security perimeter
*-Integrity Axiom
Invocation Property
3. The Physical memory address that the CPU uses
Absolute addresses
Subject to Object Model
First evaluation class
B3 - Rating
4. TCSEC provides a means to evaluate ______________________.
Reduced Instruction Set Computers (RISC)
Trusted Products Evaluation Program (TPEP)
The trustworthiness of an information system
'Dominate'
5. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
Erasable and Programmable Read-Only Memory (EPROM)
The security kernel
The Trusted Computing Base (TCB)
C2 - Controlled Access Protection
6. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Reduced Instruction Set Computers (RISC)
C2
Need-to-know
Trusted Network Interpretation (TNI)
7. When the RAM and secondary storage are combined the result is __________.
Prevent secret information from being accessed
Virtual Memory
Simple Integrity Axiom
The National Computer Security Center (NCSC)
8. Remaining parts of the operating system
Security rating B
Sensitivity labels
A security kernel
Ring 1
9. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Trusted Network Interpretation (TNI)
Dedicated Security Mode
Bell-LaPadula Model
Thrashing
10. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
The Security Kernel
Attributable - original - accurate - contemporaneous and legible
B2 rating
The Clark Wilson integrity model
11. The security kernel is the mechanism that _____________ of the reference monitor concept.
Orange Book - B1
Attributable data
Cache Memory
Enforces the rules
12. Used by Windows systems to reserve the "Swap Space"
Basic Security Theorem (used in computer science) definition
Trusted Distribution
Orange Book interpretations
Pagefile.sys file
13. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Pagefile.sys file
The Common Criteria
A lattice of Intergrity Levels
Dedicated Security Mode
14. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Trusted facility management
The security kernel
Simple Security Rule
Trusted Distribution
15. The Indexed memory addresses that software uses
Execution Domain
Logical addresses
Ring 3
The *-Property rule (Star property)
16. Intended for environments that require systems to handle classified data.
The Rule is talking about writing
Networks and Communications
C2 - Controlled Access Protection
B1 - Labeled Security rating
17. The assignment of a specific individual to administer the security-related functions of a system.
Secondary Storage
The Clark Wilson integrity model
Trusted facility management
The security kernel
18. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Division C - Discretionary Protection
Scalar processors
A1
Models concerned with integrity
19. Contains the beginning address
Networks and Communications
Be protected from modification
A Base Register (Memory Management)
All Mandatory Access Control (MAC) systems
20. System Architecture that separates system functionality into Hierarchical layers
Orange Book interpretations
Security Policy is clearly defined and documented
A Layered Operating System Architecure
Trusted Distribution
21. Which increases the performance in a computer by overlapping the steps of different instructions?
Documentation - Orange Book
Accreditation
Pipelining
Thrashing
22. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Life-cycle assurance - O/B
B2
B3
B2 rating
23. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Orange Book interpretations
The security perimeter
Primary storage
The Integrity of data within applications
24. Can be erased - modified and upgraded.
Erasable and Programmable Read-Only Memory (EPROM)
The security perimeter
Physical security
Stored in Reak Memory
25. In the Bell-LaPadula Model the Object's Label contains ___________________.
Its classification label (Top Secret - Secret or confidential)
The Monolithic Operation system Architecture
Discretionary Security Property (ds-property)
Direct addressing
26. TCB contains The Security Kernel and all ______________.
security protection mechanisms
The rule is talking about "Reading"
The security perimeter
C2 - Controlled Access Protection
27. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
*-Integrity Axiom
In C2 - Controlled Access Protection environment
Orange Book - B2
A Thread
28. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Fail safe
The Red Book
Programmable Read-Only Memory (PROM)
Disclosure of residual data
29. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Simple Integrity Axiom
The Strong star property rule
B2 - Structured Protection
B3 - Security Domains
30. Operating System Kernel
Multilevel Security Policies
Ring 0
Basic Security Theorem (used in computer science) definition
Reduced Instruction Set Computers (RISC)
31. The subject must have Need to Know for ONLY the information they are trying to access.
System High Security Mode
A Base Register (Memory Management)
Ring 1
Documentation - Orange Book
32. The Reserved hard drive space used to to extend RAM capabilites.
Prevent secret information from being accessed
Implement software or systems in a production environment
The Evaluated Products List (EPL) with their corresponding rating
Swap Space
33. The C2 evaluation class of the _________________ offers controlled access protection.
Attributable - original - accurate - contemporaneous and legible
A Domain
TCB (Trusted Computing Base)
Trusted Network Interpretation (TNI)
34. Execute one instruction at a time.
Scalar processors
Certification
Orange Book B
Ring 2
35. Which can be used as a covert channel?
Trusted Products Evaluation Program (TPEP)
Buffer (temporary data storage area)
Storage and timing
The Evaluated Products List (EPL) with their corresponding rating
36. When the address location that is specified in the program instruction contains the address of the final desired location.
Indirect addressing
Pagefile.sys file
Continuous protection - O/B
Controls the checks
37. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
A and B
A security domain
Need-to-know
38. When a computer uses more than one CPU in parallel to execute instructions is known as?
Types of covert channels
Multiprocessing
Access control to the objects by the subjects
No write down
39. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
A Thread
Prohibits
Security Policy
The rule is talking about "Reading"
40. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
Security Policy
The Rule is talking about writing
Simple Integrity Axiom
Bell-LaPadula Model
41. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Attributable - original - accurate - contemporaneous and legible
The Simple Security Property
Direct Addressing
An abstract machine
42. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Trusted Products Evaluation Program (TPEP)
Secondary Storage
Its Clearance Label (Top Secret - Secret - or Confidential)
A lattice of Intergrity Levels
43. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
B1 - Labeled Security
No write down
B3 - Rating
C2
44. Mandatory Protection
A1 - Rating
Ring 1
Networks and Communications
Orange Book B
45. The Orange book does NOT Cover ________________ - And Database management systems
Storage and timing
A security domain
Networks and Communications
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
46. The Security Model Incorporates the ____________ that should be enforced in the system.
Security Policy
B1
C1
Need-to-know
47. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
Swap Space
B1 - Labeled Security rating
All Mandatory Access Control (MAC) systems
Process isolation
48. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Orange Book - A1
B3
Thrashing
Fail safe
49. What does the simple integrity axiom mean in the Biba model?
No read down
Direct Addressing
C1 - Discretionary Security Protection
Sensitivity labels
50. A type of memory used for High-speed writing and reading activities.
Simple Security Rule
The Strong star property rule
Cache Memory
Access control to the objects by the subjects
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests