Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In the Bell-LaPadula Model the Subject's Label contains ___________________.






2. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






3. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






4. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






5. Subjects and Objects cannot change their security levels once they have been instantiated (created)






6. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






7. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






8. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






9. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






10. Documentation must be provided - including test - design - and specification document - user guides and manuals






11. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






12. TCB contains The Security Kernel and all ______________.






13. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.






14. System Architecture that separates system functionality into Hierarchical layers






15. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






16. Operating System Kernel






17. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






18. When the contents of the address defined in the program's instruction is added to that of an index register.






19. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






20. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






21. The TCB is the ________________ within a computer system that work together to enforce a security policy.






22. When the RAM and secondary storage are combined the result is __________.






23. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






24. The Bell-LaPadula Model is a _______________.






25. Data in Cache can be accessed much more quickly than Data






26. In access control terms - the word "dominate" refers to ___________.






27. What does the * (star) property mean in the Bell-LaPadula model?






28. Which TCSEC level first addresses object reuse?






29. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






30. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






31. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






32. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






33. What does the Clark-Wilson security model focus on






34. When a computer uses more than one CPU in parallel to execute instructions is known as?






35. Which is a straightforward approach that provides access rights to subjects for objects?






36. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






37. Which is an ISO standard product evaluation criteria that supersedes several different criteria






38. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






39. The assignment of a specific individual to administer the security-related functions of a system.






40. The group that oversees the processes of evaluation within TCSEC is?






41. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






42. Applications and user activity






43. A domain of trust that shares a single security policy and single management






44. What is called the formal acceptance of the adequacy of a system's overall security by management?






45. Contains the ending address






46. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






47. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






48. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






49. The Orange book requires protection against two_____________ - which are these Timing and Storage






50. Which would be designated as objects on a MAC system?