Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Trusted facility management is an assurance requirement only for ________________.






2. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.


3. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






4. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






5. The Biba Model adresses _____________________.






6. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






7. When the contents of the address defined in the program's instruction is added to that of an index register.






8. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






9. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






10. Which increases the performance in a computer by overlapping the steps of different instructions?






11. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






12. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






13. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






14. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






15. System Architecture that separates system functionality into Hierarchical layers






16. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






17. When the RAM and secondary storage are combined the result is __________.






18. The Indexed memory addresses that software uses






19. Which describe a condition when RAM and Secondary storage are used together?






20. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






21. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






22. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






23. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






24. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






25. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






26. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






27. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






28. Succesfully Evaluated products are placed on?






29. Contains the ending address






30. Mandatory access control is enfored by the use of security labels.






31. What are the components of an object's sensitivity label?






32. Which is a straightforward approach that provides access rights to subjects for objects?






33. Discretionary protection






34. In access control terms - the word "dominate" refers to ___________.






35. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






36. Which would be designated as objects on a MAC system?






37. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






38. Which can be used as a covert channel?






39. What prevents a process from accessing another process' data?






40. Which TCSEC level first addresses object reuse?






41. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






42. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






43. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






44. Which Orange Book evaluation level is described as "Verified Design"?






45. What is called the formal acceptance of the adequacy of a system's overall security by management?






46. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






47. Documentation must be provided - including test - design - and specification document - user guides and manuals






48. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






49. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






50. Simpler instructions that require fewer clock cycles to execute.