Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






2. Access control labels must be associated properly with objects.






3. Happen because input data is not checked for appropriate length at time of input






4. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






5. What model use an access control triples and requires that the system maintain separation of duty ?






6. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






7. Users need to be Identified individually to provide more precise acces control and auditing functionality.






8. What does the simple integrity axiom mean in the Biba model?






9. Involves sharing the processor amoung all ready processes






10. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






11. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






12. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






13. Which can be used as a covert channel?






14. Should always trace to individuals responsible for observing and recording the data






15. The Simple Security rule is refered to as______________.






16. I/O drivers and utilities






17. The Bell-LaPadula model Subjects and Objects are ___________.






18. The total combination of protection mechanisms within a computer system






19. The Orange book does NOT Cover ________________ - And Database management systems






20. In access control terms - the word "dominate" refers to ___________.






21. Each data object must contain a classification label and each subject must have a clearance label.






22. Which in the Orange Book ratings represents the highest level of trust?






23. What prevents a process from accessing another process' data?






24. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






25. In the Bell-LaPadula Model the Object's Label contains ___________________.






26. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






27. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






28. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






29. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






30. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. The Reserved hard drive space used to to extend RAM capabilites.






32. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






33. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






34. The Orange book requires protection against two_____________ - which are these Timing and Storage






35. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






36. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






37. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






38. Contains the beginning address






39. Mandatory Access requires that _____________ be attached to all objects.






40. The subject must have Need to Know for ONLY the information they are trying to access.






41. Permits a database to have two records that are identical except for Their classifications






42. As per FDA data should be ______________________________.






43. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






44. Which is a straightforward approach that provides access rights to subjects for objects?






45. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






46. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






47. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






48. Contains an Address of where the instruction and dara reside that need to be processed.






49. A domain of trust that shares a single security policy and single management






50. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.