Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






2. In access control terms - the word "dominate" refers to ___________.






3. When a portion of primary memory is accessed by specifying the actual address of the memory location






4. Permits a database to have two records that are identical except for Their classifications






5. The Orange book does NOT Cover ________________ - And Database management systems






6. The Simple Security rule is refered to as______________.






7. When a computer uses more than one CPU in parallel to execute instructions is known as?






8. The assignment of a specific individual to administer the security-related functions of a system.






9. The Bell-LaPadula model Subjects and Objects are ___________.






10. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






11. Contains an Address of where the instruction and dara reside that need to be processed.






12. Which can be used as a covert channel?






13. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






14. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






15. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






16. The Bell-LaPadula Model is a _______________.






17. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. As per FDA data should be ______________________________.






19. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






20. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






21. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






22. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






23. The Reserved hard drive space used to to extend RAM capabilites.






24. What does the simple integrity axiom mean in the Biba model?






25. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






26. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






27. Happen because input data is not checked for appropriate length at time of input






28. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






29. Verification Protection






30. Applications and user activity






31. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






32. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






33. Which uses Protection Profiles and Security Targets?






34. Trusted facility management is an assurance requirement only for ________________.






35. Which TCSEC level first addresses object reuse?






36. What access control technique is also known as multilevel security?






37. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






38. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






39. Which is an ISO standard product evaluation criteria that supersedes several different criteria






40. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






41. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






42. A Policy based control. All objects and systems have a sensitivity level assigned to them






43. The subject must have Need to Know for ONLY the information they are trying to access.






44. Each data object must contain a classification label and each subject must have a clearance label.






45. The C2 evaluation class of the _________________ offers controlled access protection.






46. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






47. Which increases the performance in a computer by overlapping the steps of different instructions?






48. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






49. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






50. Mandatory Protection