Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






2. What does the simple integrity axiom mean in the Biba model?






3. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






4. The Indexed memory addresses that software uses






5. As per FDA data should be ______________________________.






6. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






7. Which is a straightforward approach that provides access rights to subjects for objects?






8. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






9. When the contents of the address defined in the program's instruction is added to that of an index register.






10. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






11. A subject at a given clearance may not read an object at a higher classification






12. The TCB is the ________________ within a computer system that work together to enforce a security policy.






13. A Policy based control. All objects and systems have a sensitivity level assigned to them






14. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






15. What are the components of an object's sensitivity label?






16. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






17. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






18. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






19. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






20. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






21. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






22. Documentation must be provided - including test - design - and specification document - user guides and manuals






23. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






24. Which Orange Book evaluation level is described as "Verified Design"?






25. A system uses the Reference Monitor to ___________________ of a subject and an object?






26. When the address location that is specified in the program instruction contains the address of the final desired location.






27. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






28. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






29. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






30. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






31. Individual subjects must be uniquely identified.






32. When a computer uses more than one CPU in parallel to execute instructions is known as?






33. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






34. Discretionary protection






35. The Bell-LaPadula Model is a _______________.






36. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






37. Happen because input data is not checked for appropriate length at time of input






38. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






39. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






40. The total combination of protection mechanisms within a computer system






41. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






42. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






43. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






44. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






45. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






46. The Simple Security rule is refered to as______________.






47. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






48. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






49. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






50. Execute one instruction at a time.