SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In the Bell-LaPadula Model the Object's Label contains ___________________.
Dedicated Security Mode
Process isolation
Swap Space
Its classification label (Top Secret - Secret or confidential)
2. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
B3 - Security Domains
C1 - Discrection Security Protection is a type of environment
The Trusted Computing Base (TCB)
B2 - Structured Protection
3. Simpler instructions that require fewer clock cycles to execute.
Reduced Instruction Set Computers (RISC)
Evaluated separately
Compare the security labels
B1 - Labeled Security
4. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
C1 - Discretionary Security Protection
Trusted Distribution
The trustworthiness of an information system
Protection Rings Support
5. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
Higher or equal to access class
Covert channels
B3 - Rating
Fail safe
6. What prevents a process from accessing another process' data?
In C2 - Controlled Access Protection environment
Networks and Communications
Physical security
Process isolation
7. The group that oversees the processes of evaluation within TCSEC is?
Trusted Products Evaluation Program (TPEP)
B1 - Labeled Security
Prevent secret information from being accessed
Controls the checks
8. The Orange book requires protection against two_____________ - which are these Timing and Storage
Indirect addressing
Trusted Distribution
Types of covert channels
Enforces the rules
9. Applications and user activity
A Layered Operating System Architecure
Administrative declaration
C2 - Controlled Access Protection
Ring 3
10. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Orange Book ratings
The security kernel
Dedicated Security Mode
Access control to the objects by the subjects
11. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Division B - Mandatory Protection Architecture
B2 - Structured Protection
Examples of Layered Operating Systems
Dedicated Security Mode
12. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
Identification - Orange Book
The Rule is talking about writing
B3
No write down
13. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Be protected from modification
Real storage
Access control to the objects by the subjects
A and B
14. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
A lattice of Intergrity Levels
Prevent secret information from being accessed
First evaluation class
Networks and Communications
15. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Security mechanisms and evalautes their effectivenes
No read down
A lattice of Intergrity Levels
Accountability - Orange Book
16. The C2 evaluation class of the _________________ offers controlled access protection.
A and B
The Tranqulity principle (The Bell-LaPadula Model)
The Security Kernel
Trusted Network Interpretation (TNI)
17. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
The security perimeter
Multiprocessing
The trustworthiness of an information system
State machine model
18. The total combination of protection mechanisms within a computer system
TCB (Trusted Computing Base)
B3 - Security Domains
Reduced Instruction Set Computers (RISC)
Integrity
19. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
State machine model
Orange Book - D
A lattice of Intergrity Levels
Bell-LaPadula Model
20. Remaining parts of the operating system
Attributable data
Ring 1
No read up
Disclosure of residual data
21. When the RAM and secondary storage are combined the result is __________.
Virtual Memory
Government and military applications
B2 - Structured Protection
Covert channels
22. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Security rating B
*-Integrity Axiom
A Base Register (Memory Management)
Its Clearance Label (Top Secret - Secret - or Confidential)
23. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
Orange Book C
C2
A and B
The TCSEC - Aka Orange Book
24. Which in the Orange Book ratings represents the highest level of trust?
Indexed addressing
B2
Storage and timing
Identification - Orange Book
25. What is called the formal acceptance of the adequacy of a system's overall security by management?
Accreditation
Pagefile.sys file
Compare the security labels
B1
26. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Execution Domain
Real storage
No read up
C2
27. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
The Simple Security Property
B3
In C2 - Controlled Access Protection environment
A Thread
28. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Thrashing
Life-cycle assurance - O/B
Security mechanisms and evalautes their effectivenes
The "No write Down" Rule
29. As per FDA data should be ______________________________.
Accountability - Orange Book
Isolate processes
Attributable - original - accurate - contemporaneous and legible
Documentation - Orange Book
30. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
Attributable data
Its classification label (Top Secret - Secret or confidential)
Security Policy
The Biba Model
31. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
Process isolation
Most commonly used approach
Physical security
First evaluation class
32. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Totality of protection mechanisms
The security perimeter
The Security Kernel
A security domain
33. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
The security perimeter
Prohibits
The National Computer Security Center (NCSC)
The Thread (memory Management)
34. Execute one instruction at a time.
Absolute addresses
Indexed addressing
The security perimeter
Scalar processors
35. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Orange Book - B3
Documentation - Orange Book
Invocation Property
Trusted facility management
36. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Multitasking
The TCSEC - Aka Orange Book
A lattice of Intergrity Levels
Process isolation
38. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
Division B - Mandatory Protection
Trusted Distribution
Subject to Object Model
Basic Security Theorem (used in computer science) definition
39. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Complex Instruction Set Computers (CISC)
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Firmware
B1 - Labeled Security
40. What does the * (star) property mean in the Bell-LaPadula model?
Continuous protection - O/B
Buffer (temporary data storage area)
The reference monitor
No write down
41. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
The Simple Security Property
Clark-Wilson Model
Protection Rings Support
A1 - Rating
42. What does the simple security (ss) property mean in the Bell-LaPadula model?
In C2 - Controlled Access Protection environment
Indexed addressing
The Rule is talking about writing
No read up
43. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Security Policy
The trustworthiness of an information system
Accreditation
Bell-LaPadula Model
44. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Networks and Communications
C1
C2 - Controlled Access Protection
Security rating B
45. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
Primary storage
The security perimeter
The National Computer Security Center (NCSC)
B2 rating
46. The Bell-LaPadula model Subjects and Objects are ___________.
Assigned labels
Basic Security Theorem (used in computer science) definition
The Clark Wilson integrity model
Secondary Storage
47. The Bell-LaPadula Model is a _______________.
Subject to Object Model
Mandatory access control
The "No read Up" rule
Erasable and Programmable Read-Only Memory (EPROM)
48. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Virtual Memory
Administrative declaration
International Standard 15408
Mandatory access control
49. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
B1 - Labeled Security
Orange Book - A1
Division D - Minimal Protection
The Security Kernel