SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
The rule is talking about "Reading"
The "No write Down" Rule
Need-to-know
Fail safe
2. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
B3 - Rating
Certification
The Clark Wilson integrity model
The Red Book
3. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
A and B
Accreditation
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
A lattice of Intergrity Levels
4. The C2 evaluation class of the _________________ offers controlled access protection.
Secondary Storage
Its Clearance Label (Top Secret - Secret - or Confidential)
A Domain
Trusted Network Interpretation (TNI)
5. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
The Security Kernel
Indexed addressing
A and B
Implement software or systems in a production environment
6. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Storage and timing
Evaluated separately
Accreditation
Documentation - Orange Book
7. The Biba Model adresses _____________________.
The Integrity of data within applications
An abstract machine
The trustworthiness of an information system
Orange Book B
8. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book - A1
C2 - Controlled Access Protection
The *-Property rule (Star property)
Operational assurance requirements
9. Users need to be Identified individually to provide more precise acces control and auditing functionality.
Covert channels
Life Cycle Assurance Requirement
Identification - Orange Book
C2 - Controlled Access Protection
10. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
The *-Property rule (Star property)
*-Integrity Axiom
Security mechanisms and evalautes their effectivenes
Trusted Products Evaluation Program (TPEP)
11. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Relative Addresses
C1 - Discrection Security Protection is a type of environment
Reduced Instruction Set Computers (RISC)
Disclosure of residual data
13. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
C2
Life Cycle Assurance Requirement
Mandatory Access Control (MAC)
Examples of Layered Operating Systems
14. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
Bell-LaPadula Model
Fail safe
Accountability - Orange Book
attributability
15. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Trusted hardware - Software and Firmware
Continuous protection - O/B
Indexed addressing
A single classification and a Compartment Set
16. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
The TCSEC - Aka Orange Book
Operational assurance requirements
Ring 0
In C2 - Controlled Access Protection environment
17. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Indirect addressing
Operational assurance requirements
Security Policy
C2
18. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
Its Clearance Label (Top Secret - Secret - or Confidential)
NOT Integrity
Direct addressing
A lattice of Intergrity Levels
19. Which is a straightforward approach that provides access rights to subjects for objects?
Access Matrix model
Buffer (temporary data storage area)
Continuous protection - O/B
Its classification label (Top Secret - Secret or confidential)
20. The Availability - Integrity and confidentiality requirements of multitasking operating systems
Protection Rings Support
Identification - Orange Book
B1 - Labeled Security
Administrative declaration
21. What prevents a process from accessing another process' data?
security protection mechanisms
Polyinstantiation
Dominate the object's sensitivity label
Process isolation
22. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Covert channels
Life Cycle Assurance Requirement
The Monolithic Operation system Architecture
Controlling unauthorized downgrading of information
23. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Sensitivity labels
Controlling unauthorized downgrading of information
Ring 3
First evaluation class
24. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Physical security
Covert channels
Dominate the object's sensitivity label
Networks and Communications
25. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Clark-Wilson Model
The trustworthiness of an information system
Trusted Distribution
Physical security
26. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
Process isolation
Security Policy - Orange Book
C1
*-Integrity Axiom
27. Which TCSEC level first addresses object reuse?
C2
Dominate the object's sensitivity label
Trusted Distribution
B1
28. Another word for Primary storage and distinguishes physical memory from virtual memory.
A lattice of Intergrity Levels
Compare the security labels
Physical security
Real storage
29. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
Models concerned with integrity
Types of covert channels
State machine model
The "No read Up" rule
30. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Orange Book C
Highly secure systems (B2 - B3 and A1)
Its Clearance Label (Top Secret - Secret - or Confidential)
In C2 - Controlled Access Protection environment
31. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
Orange Book - B3
Pagefile.sys file
Buffer overflows
Absolute addresses
32. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Security Policy - Orange Book
System High Security Mode
Orange Book C
Division D - Minimal Protection
33. I/O drivers and utilities
B2
B3 - Rating
Compare the security labels
Ring 2
34. Which uses Protection Profiles and Security Targets?
Security rating B
Constrained
Buffer overflows
International Standard 15408
35. Involves sharing the processor amoung all ready processes
B3 - Security Domains
Multitasking
Cache Memory
In C2 - Controlled Access Protection environment
36. When the contents of the address defined in the program's instruction is added to that of an index register.
Multitasking
The Monolithic Operation system Architecture
attributability
Indexed addressing
37. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The Evaluated Products List (EPL) with their corresponding rating
A security kernel
All Mandatory Access Control (MAC) systems
The Trusted Computing Base (TCB)
38. What model use an access control triples and requires that the system maintain separation of duty ?
Attributable data
B2
Accountability - Orange Book
Clark-Wilson
39. Intended for environments that require systems to handle classified data.
The Monolithic Operation system Architecture
B1 - Labeled Security rating
Multitasking
Absolute addresses
40. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Discretionary Security Property (ds-property)
Covert channels
C2 - Controlled Access Protection
B3
41. The Simple Security rule is refered to as______________.
The "No write Down" Rule
The "No read Up" rule
System High Security Mode
Bell-LaPadula Model
42. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
C2
Trusted facility management
Virtual storage
B2 - Structured Protection
43. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Trusted hardware - Software and Firmware
The trustworthiness of an information system
Primary storage
B2 - Structured Protection
44. Permits a database to have two records that are identical except for Their classifications
C1 - Discretionary Security Protection
Polyinstantiation
Absolute addresses
B2 - Structured Protection
45. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
In C2 - Controlled Access Protection environment
Indexed addressing
B3 - Security Domains
Trusted Products Evaluation Program (TPEP)
46. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
security protection mechanisms
Fail safe
Access control to the objects by the subjects
Administrative declaration
47. As per FDA data should be ______________________________.
Assigned labels
Simple Integrity Axiom
Attributable - original - accurate - contemporaneous and legible
In C2 - Controlled Access Protection environment
48. Each data object must contain a classification label and each subject must have a clearance label.
Compare the security labels
Networks and Communications
A security domain
B1 - Labeled Security
49. Mandatory Protection
Virtual Memory
Models concerned with integrity
Orange Book B
Trusted hardware - Software and Firmware
50. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Division B - Mandatory Protection
Secondary Storage
B2 - Structured Protection
D
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests