SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
Certification
A Domain
Primary storage
Clark-Wilson Model
2. What prevents a process from accessing another process' data?
Multilevel Security Policies
security protection mechanisms
Process isolation
Integrity
3. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Most commonly used approach
Examples of Layered Operating Systems
Simple Integrity Axiom
Enforces the rules
4. Intended for environments that require systems to handle classified data.
The security kernel
Government and military applications
B1 - Labeled Security rating
Cache Memory
5. What does the simple integrity axiom mean in the Biba model?
No read down
Security Policy - Orange Book
Bell-LaPadula Model
Fail safe
6. A subject at a given clearance may not read an object at a higher classification
The Simple Security Property
International Standard 15408
Orange Book C
Disclosure of residual data
7. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
B3 - Security Domains
*-Integrity Axiom
Storage and timing
Mandatory Access Control (MAC)
8. The *-Property rule is refered to as ____________.
A1
The "No write Down" Rule
The Security Kernel
Trusted facility management
9. The total combination of protection mechanisms within a computer system
Orange Book - B3
Examples of Layered Operating Systems
C1 - Discretionary Security Protection
TCB (Trusted Computing Base)
10. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Its Clearance Label (Top Secret - Secret - or Confidential)
The "No read Up" rule
The trustworthiness of an information system
Storage and timing
11. When a computer uses more than one CPU in parallel to execute instructions is known as?
B2 rating
Multiprocessing
Orange Book C
Complex Instruction Set Computers (CISC)
12. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Life-cycle assurance - O/B
Pagefile.sys file
Need-to-know
Buffer (temporary data storage area)
13. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
Primary storage
Prevent secret information from being accessed
Thrashing
The Biba Model
14. Audit data must be captured and protected to enforce accountability
Accountability - Orange Book
*-Integrity Axiom
Accreditation
Dominate the object's sensitivity label
15. TCSEC provides a means to evaluate ______________________.
Enforces the rules
The National Computer Security Center (NCSC)
Covert channels
The trustworthiness of an information system
16. The assignment of a specific individual to administer the security-related functions of a system.
Trusted facility management
Programmable Read-Only Memory (PROM)
Swap Space
Files - directories and devices
17. A Policy based control. All objects and systems have a sensitivity level assigned to them
Buffer (temporary data storage area)
Overt channel
Mandatory Access Control (MAC)
attributability
18. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
The TCSEC - Aka Orange Book
Mandatory Access Control (MAC)
Operational assurance requirements
Secondary Storage
19. Permits a database to have two records that are identical except for Their classifications
Buffer (temporary data storage area)
Files - directories and devices
Swap Space
Polyinstantiation
20. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Evaluated separately
Administrative declaration
Erasable and Programmable Read-Only Memory (EPROM)
B3 - Rating
21. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Models concerned with integrity
C2 - Controlled Access Protection
security protection mechanisms
Firmware
22. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
C2 - Controlled Access Protection
No read up
A Thread
Orange Book - B1
23. What does the * (star) property mean in the Bell-LaPadula model?
No write down
Scalar processors
B3
In C2 - Controlled Access Protection environment
24. The combination of RAM - Cache and the Processor Registers
The "No write Down" Rule
Primary storage
Absolute addresses
Trusted Products Evaluation Program (TPEP)
25. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Enforces the rules
The Strong star property rule
Life Cycle Assurance Requirement
Ring 0
26. The Biba Model adresses _____________________.
Totality of protection mechanisms
Controlling unauthorized downgrading of information
Files - directories and devices
The Integrity of data within applications
27. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
Life Cycle Assurance Requirement
Bell-LaPadula Model
The Biba Model
The Trusted Computing Base (TCB)
28. What does the Clark-Wilson security model focus on
B1 - Labeled Security
Integrity
Process isolation
Discretionary Security Property (ds-property)
29. The Orange book does NOT Cover ________________ - And Database management systems
The National Computer Security Center (NCSC)
The TCSEC - Aka Orange Book
The Rule is talking about writing
Networks and Communications
30. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
A security kernel
Reduced Instruction Set Computers (RISC)
A single classification and a Compartment Set
Most commonly used approach
31. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
Primary storage
Orange Book - B1
Accreditation
The security perimeter
33. Happen because input data is not checked for appropriate length at time of input
Buffer overflows
Be protected from modification
Relative Addresses
Life-cycle assurance - O/B
34. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
Dominate the object's sensitivity label
The Common Criteria
Subject to Object Model
A1 - Rating
35. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
B2 - Structured Protection
State machine model
The National Computer Security Center (NCSC)
The Tranqulity principle (The Bell-LaPadula Model)
36. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Trusted Distribution
In C2 - Controlled Access Protection environment
The National Computer Security Center (NCSC)
Physical security
37. Which increases the performance in a computer by overlapping the steps of different instructions?
Pipelining
Virtual storage
Reduced Instruction Set Computers (RISC)
Basic Security Theorem (used in computer science) definition
38. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
A security domain
B3
The Security Kernel
Basic Security Theorem (used in computer science) definition
39. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
B3
*-Integrity Axiom
Totality of protection mechanisms
Real storage
40. Applications and user activity
Disclosure of residual data
A1
Integrity
Ring 3
41. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Security mechanisms and evalautes their effectivenes
Prevent secret information from being accessed
A Domain
Complex Instruction Set Computers (CISC)
42. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Discretionary Security Property (ds-property)
A security domain
Indexed addressing
B3
43. The security kernel is the mechanism that _____________ of the reference monitor concept.
No write down
First evaluation class
Prohibits
Enforces the rules
44. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
All Mandatory Access Control (MAC) systems
The "No write Down" Rule
Sensitivity labels
Overt channel
45. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Secondary Storage
Controls the checks
The Integrity of data within applications
C1 - Discrection Security Protection is a type of environment
46. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
Life-cycle assurance - O/B
Ring 2
D
The Rule is talking about writing
47. Verification Protection
Orange Book - B2
B1 - Labeled Security rating
Higher or equal to access class
Orange Book A
48. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
No read down
Orange Book ratings
The Red Book
Division D - Minimal Protection
49. Mandatory access control is enfored by the use of security labels.
Stored in Reak Memory
A Thread
Division B - Mandatory Protection
The security kernel
50. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
First evaluation class
Security mechanisms and evalautes their effectivenes
The Rule is talking about writing
The *-Property rule (Star property)