Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which increases the performance in a computer by overlapping the steps of different instructions?






2. Simpler instructions that require fewer clock cycles to execute.






3. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






4. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






5. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






6. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






7. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






8. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






9. Remaining parts of the operating system






10. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






11. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






12. Can be erased - modified and upgraded.






13. All users have a clearance for and a formal need to know about - all data processed with the system.






14. Used by Windows systems to reserve the "Swap Space"






15. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






16. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






17. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






18. Data in Cache can be accessed much more quickly than Data






19. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






20. I/O drivers and utilities






21. Succesfully Evaluated products are placed on?






22. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






23. What does the Clark-Wilson security model focus on






24. Which is an ISO standard product evaluation criteria that supersedes several different criteria






25. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






26. Contains the ending address






27. A Policy based control. All objects and systems have a sensitivity level assigned to them






28. The C2 evaluation class of the _________________ offers controlled access protection.






29. Individual subjects must be uniquely identified.






30. The Orange book does NOT Cover ________________ - And Database management systems






31. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






32. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






33. The TCB is the ________________ within a computer system that work together to enforce a security policy.






34. The security kernel is the mechanism that _____________ of the reference monitor concept.






35. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






36. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






37. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






38. When a portion of primary memory is accessed by specifying the actual address of the memory location






39. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






40. Happen because input data is not checked for appropriate length at time of input






41. Based on a known address with an offset value applied.






42. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






43. Mandatory Access requires that _____________ be attached to all objects.






44. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






45. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






46. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






47. The assignment of a specific individual to administer the security-related functions of a system.






48. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






49. The Policy must be explicit and well defined and enforced by the mechanisms within the system






50. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities