SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
Subject to Object Model
The Tranqulity principle (The Bell-LaPadula Model)
Life Cycle Assurance Requirement
Complex Instruction Set Computers (CISC)
2. Audit data must be captured and protected to enforce accountability
Clark-Wilson Model
System High Security Mode
Accountability - Orange Book
B3
3. The Simple Security rule is refered to as______________.
Accountability - Orange Book
Execution Domain
Storage and timing
The "No read Up" rule
4. Which uses Protection Profiles and Security Targets?
Models concerned with integrity
Networks and Communications
Security Policy is clearly defined and documented
International Standard 15408
5. The total combination of protection mechanisms within a computer system
Dedicated Security Mode
A Domain
TCB (Trusted Computing Base)
B3
6. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
C2 - Controlled Access Protection
Enforces the rules
A and B
Secondary Storage
7. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. Access control labels must be associated properly with objects.
Dedicated Security Mode
Buffer overflows
Labels - Orange Book
Complex Instruction Set Computers (CISC)
9. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Orange Book - A1
Controls the checks
Need-to-know
Isolate processes
10. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Clark-Wilson Model
Secondary Storage
Security rating B
Polyinstantiation
11. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Compare the security labels
B2 - Structured Protection
Firmware
Orange Book - D
12. The Security Model Incorporates the ____________ that should be enforced in the system.
Operational assurance requirements
Trusted Products Evaluation Program (TPEP)
Accountability - Orange Book
Security Policy
13. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
B3 - Rating
C2 - Controlled Access Protection
Buffer (temporary data storage area)
C2 - Controlled Access Protection
14. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
The "No write Down" Rule
Its Clearance Label (Top Secret - Secret - or Confidential)
Security rating B
Highly secure systems (B2 - B3 and A1)
15. Discretionary protection
Its Clearance Label (Top Secret - Secret - or Confidential)
Thrashing
Accountability - Orange Book
Orange Book C
16. According to the Orange Book - trusted facility management is not required for which security levels?
'Dominate'
B1
Pipelining
Dominate the object's sensitivity label
17. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Bell-LaPadula Model
Orange Book - D
Isolate processes
Secondary Storage
18. When a portion of primary memory is accessed by specifying the actual address of the memory location
Direct addressing
The "No write Down" Rule
Dominate the object's sensitivity label
Stored in Reak Memory
19. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Higher or equal to access class
C2 - Controlled Access Protection
Orange Book - A1
The National Computer Security Center (NCSC)
20. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
The "No write Down" Rule
Trusted Distribution
A security kernel
Stored in Reak Memory
21. The assignment of a specific individual to administer the security-related functions of a system.
Trusted facility management
Stored in Reak Memory
Firmware
The Red Book
22. Data in Cache can be accessed much more quickly than Data
Ring 1
Discretionary Security Property (ds-property)
Stored in Reak Memory
The Evaluated Products List (EPL) with their corresponding rating
23. What does the * (star) property mean in the Bell-LaPadula model?
Orange Book - A1
Trusted Distribution
No write down
The Tranqulity principle (The Bell-LaPadula Model)
24. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
The security perimeter
Accountability - Orange Book
A Thread
Dominate the object's sensitivity label
25. The Bell-LaPadula Model is a _______________.
The security kernel
The National Computer Security Center (NCSC)
Subject to Object Model
B2 - Structured Protection
26. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Orange Book A
Security mechanisms and evalautes their effectivenes
C1 - Discretionary Security Protection
B2 - Structured Protection
27. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Division B - Mandatory Protection Architecture
Disclosure of residual data
Ring 0
The Common Criteria
28. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Most commonly used approach
A security domain
The National Computer Security Center (NCSC)
B3 - Security Domains
29. Permits a database to have two records that are identical except for Their classifications
Polyinstantiation
Examples of Layered Operating Systems
Evaluated separately
Erasable and Programmable Read-Only Memory (EPROM)
30. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
TCB (Trusted Computing Base)
Programmable Read-Only Memory (PROM)
Orange Book - B3
The security perimeter
31. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Security Policy
Buffer (temporary data storage area)
Attributable - original - accurate - contemporaneous and legible
Controlling unauthorized downgrading of information
32. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
The TCSEC - Aka Orange Book
The Evaluated Products List (EPL) with their corresponding rating
D
The Trusted Computing Base (TCB)
33. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Orange Book ratings
Documentation - Orange Book
Totality of protection mechanisms
Enforces the rules
34. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
A single classification and a Compartment Set
Pagefile.sys file
Dedicated Security Mode
A and B
35. A type of memory used for High-speed writing and reading activities.
Cache Memory
Discretionary Security Property (ds-property)
Erasable and Programmable Read-Only Memory (EPROM)
The Evaluated Products List (EPL) with their corresponding rating
36. As per FDA data should be ______________________________.
The Biba Model
Mandatory access control
Attributable - original - accurate - contemporaneous and legible
Enforces the rules
37. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Prevent secret information from being accessed
Direct addressing
The *-Property rule (Star property)
Protection Rings Support
38. When the address location that is specified in the program instruction contains the address of the final desired location.
B3
Indirect addressing
No read down
C1
39. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Complex Instruction Set Computers (CISC)
Execution Domain
The security perimeter
Evaluated separately
40. What are the components of an object's sensitivity label?
Division C - Discretionary Protection
Administrative declaration
The "No write Down" Rule
A single classification and a Compartment Set
41. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book - A1
Swap Space
In C2 - Controlled Access Protection environment
Complex Instruction Set Computers (CISC)
42. The *-Property rule is refered to as ____________.
C2 - Controlled Access Protection
Mandatory Access Control (MAC)
The "No write Down" Rule
Higher or equal to access class
43. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Real storage
B3
Buffer (temporary data storage area)
44. Trusted facility management is an assurance requirement only for ________________.
Erasable and Programmable Read-Only Memory (EPROM)
C1 - Discrection Security Protection is a type of environment
The Integrity of data within applications
Highly secure systems (B2 - B3 and A1)
45. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
No read down
Logical addresses
Ring 0
Covert channels
46. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
A Base Register (Memory Management)
Pagefile.sys file
C1 - Discrection Security Protection is a type of environment
Mandatory access control
47. Which is a straightforward approach that provides access rights to subjects for objects?
B2 rating
A Domain
B3 - Rating
Access Matrix model
48. Used by Windows systems to reserve the "Swap Space"
Relative Addresses
Pagefile.sys file
Process isolation
Storage and timing
49. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
'Dominate'
Cache Memory
Multiprocessing
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
50. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
In C2 - Controlled Access Protection environment
Assigned labels
An abstract machine
Enforces the rules
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests