Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Should always trace to individuals responsible for observing and recording the data






2. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






3. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






4. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






5. A domain of trust that shares a single security policy and single management






6. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






7. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






8. What prevents a process from accessing another process' data?






9. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






10. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






11. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






12. When the RAM and secondary storage are combined the result is __________.






13. Each data object must contain a classification label and each subject must have a clearance label.






14. Used by Windows systems to reserve the "Swap Space"






15. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






16. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






17. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






18. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






19. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






20. Which is a straightforward approach that provides access rights to subjects for objects?






21. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






22. When a vendor submits a product for evaluation - it submits it to the ____________.






23. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






24. The TCB is the ________________ within a computer system that work together to enforce a security policy.






25. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






26. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






27. What model use an access control triples and requires that the system maintain separation of duty ?






28. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






29. What does the Clark-Wilson security model focus on






30. Audit data must be captured and protected to enforce accountability






31. The Physical memory address that the CPU uses






32. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






33. The Policy must be explicit and well defined and enforced by the mechanisms within the system






34. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






35. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






36. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






37. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






38. The group that oversees the processes of evaluation within TCSEC is?






39. Which Orange Book evaluation level is described as "Verified Design"?






40. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. Mandatory Access requires that _____________ be attached to all objects.






42. The Indexed memory addresses that software uses






43. What does the simple integrity axiom mean in the Biba model?






44. The Orange book does NOT Cover ________________ - And Database management systems






45. In access control terms - the word "dominate" refers to ___________.






46. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






48. Documentation must be provided - including test - design - and specification document - user guides and manuals






49. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






50. The Bell-LaPadula model Subjects and Objects are ___________.