Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When a computer uses more than one CPU in parallel to execute instructions is known as?






2. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






3. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






4. The security kernel is the mechanism that _____________ of the reference monitor concept.






5. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






6. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






7. Which Orange Book evaluation level is described as "Verified Design"?






8. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






9. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






10. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






11. Subjects and Objects cannot change their security levels once they have been instantiated (created)






12. In the Bell-LaPadula Model the Object's Label contains ___________________.






13. Another word for Primary storage and distinguishes physical memory from virtual memory.






14. The C2 evaluation class of the _________________ offers controlled access protection.






15. A type of memory used for High-speed writing and reading activities.






16. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






17. Used by Windows systems to reserve the "Swap Space"






18. Which increases the performance in a computer by overlapping the steps of different instructions?






19. What does the simple integrity axiom mean in the Biba model?






20. The Bell-LaPadula Model is a _______________.






21. The combination of RAM - Cache and the Processor Registers






22. The TCB is the ________________ within a computer system that work together to enforce a security policy.






23. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






24. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification


25. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






26. Which TCSEC level first addresses object reuse?






27. Succesfully Evaluated products are placed on?






28. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






29. Which can be used as a covert channel?






30. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






31. A set of objects that a subject is able to access






32. The *-Property rule is refered to as ____________.






33. When the address location that is specified in the program instruction contains the address of the final desired location.






34. Which is an ISO standard product evaluation criteria that supersedes several different criteria






35. What does the Clark-Wilson security model focus on






36. The Biba Model adresses _____________________.






37. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






38. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






39. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






40. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






41. Contains the beginning address






42. In access control terms - the word "dominate" refers to ___________.






43. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






44. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






45. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






46. I/O drivers and utilities






47. The Indexed memory addresses that software uses






48. A domain of trust that shares a single security policy and single management






49. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






50. Which is a straightforward approach that provides access rights to subjects for objects?