SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
Subject to Object Model
The Rule is talking about writing
Examples of Layered Operating Systems
Trusted facility management
2. The Orange book requires protection against two_____________ - which are these Timing and Storage
Buffer (temporary data storage area)
Cache Memory
Its Clearance Label (Top Secret - Secret - or Confidential)
Types of covert channels
3. Succesfully Evaluated products are placed on?
Access control to the objects by the subjects
The Evaluated Products List (EPL) with their corresponding rating
Types of covert channels
Ring 3
4. The TCB is the ________________ within a computer system that work together to enforce a security policy.
The TCSEC - Aka Orange Book
Dedicated Security Mode
Labels - Orange Book
Totality of protection mechanisms
5. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Prevent secret information from being accessed
Disclosure of residual data
Pagefile.sys file
C2 - Controlled Access Protection
6. Happen because input data is not checked for appropriate length at time of input
Integrity
Buffer overflows
Mandatory access control
The "No read Up" rule
7. Which Orange Book evaluation level is described as "Verified Design"?
Buffer (temporary data storage area)
Certification
Compare the security labels
A1
8. The total combination of protection mechanisms within a computer system
TCB (Trusted Computing Base)
The Thread (memory Management)
A lattice of Intergrity Levels
The Red Book
9. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
B3
Accountability - Orange Book
Reduced Instruction Set Computers (RISC)
The reference monitor
10. What does the simple integrity axiom mean in the Biba model?
Ring 3
No read down
*-Integrity Axiom
Invocation Property
11. In the Bell-LaPadula Model the Object's Label contains ___________________.
Its classification label (Top Secret - Secret or confidential)
Cache Memory
Attributable - original - accurate - contemporaneous and legible
Indirect addressing
12. The Bell-LaPadula Model is a _______________.
No write down
Subject to Object Model
The Thread (memory Management)
The security perimeter
13. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
'Dominate'
The Red Book
B2 - Structured Protection
14. Data in Cache can be accessed much more quickly than Data
Administrative declaration
The security kernel
Need-to-know
Stored in Reak Memory
15. Subjects and Objects cannot change their security levels once they have been instantiated (created)
The Tranqulity principle (The Bell-LaPadula Model)
The Biba Model
The Red Book
Division C - Discretionary Protection
16. Which would be designated as objects on a MAC system?
Orange Book ratings
B2 - Structured Protection
The Clark Wilson integrity model
Files - directories and devices
17. Mandatory Protection
Orange Book B
A Limit Register (Memory Management)
Protection Rings Support
D
18. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
First evaluation class
Indexed addressing
Orange Book A
Identification - Orange Book
19. Mandatory access control is enfored by the use of security labels.
B3 - Security Domains
The Biba Model
Division B - Mandatory Protection
The TCSEC - Aka Orange Book
20. Intended for environments that require systems to handle classified data.
The Security Kernel
B1 - Labeled Security rating
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Bell-LaPadula Model
21. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
Constrained
attributability
The Evaluated Products List (EPL) with their corresponding rating
Compare the security labels
22. What does the Clark-Wilson security model focus on
C1
A lattice of Intergrity Levels
Integrity
Absolute addresses
23. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Polyinstantiation
Disclosure of residual data
Trusted Products Evaluation Program (TPEP)
Implement software or systems in a production environment
24. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Identification - Orange Book
Dedicated Security Mode
Prevent secret information from being accessed
Orange Book ratings
25. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Secondary Storage
The security kernel
Relative Addresses
Accreditation
26. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
The Red Book
Fail safe
Clark-Wilson
Orange Book A
27. The Biba Model adresses _____________________.
Orange Book ratings
Scalar processors
The Integrity of data within applications
Trusted Distribution
28. Users need to be Identified individually to provide more precise acces control and auditing functionality.
C2 - Controlled Access Protection
Higher or equal to access class
Operational assurance requirements
In C2 - Controlled Access Protection environment
29. I/O drivers and utilities
State machine model
Trusted Distribution
Logical addresses
Ring 2
30. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m
C2 - Controlled Access Protection
Pagefile.sys file
Constrained
Identification - Orange Book
31. Applications and user activity
A Base Register (Memory Management)
Security mechanisms and evalautes their effectivenes
Ring 3
Mandatory Access Control (MAC)
32. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Controlling unauthorized downgrading of information
A security domain
A1
Life Cycle Assurance Requirement
33. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Indirect addressing
B3 - Rating
C1
34. Discretionary protection
Most commonly used approach
Thrashing
Orange Book A
Orange Book C
35. A domain of trust that shares a single security policy and single management
Government and military applications
C1
A security domain
Its Clearance Label (Top Secret - Secret - or Confidential)
36. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
Dominate the object's sensitivity label
Enforces the rules
A and B
37. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
B2 rating
Accountability - Orange Book
C2 - Controlled Access Protection
The rule is talking about "Reading"
38. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
TCB (Trusted Computing Base)
State machine model
Cache Memory
Clark-Wilson Model
39. Which is a straightforward approach that provides access rights to subjects for objects?
Access Matrix model
Labels - Orange Book
Indirect addressing
Buffer (temporary data storage area)
40. When a vendor submits a product for evaluation - it submits it to the ____________.
The National Computer Security Center (NCSC)
Labels - Orange Book
security protection mechanisms
Orange Book - A1
41. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. A Policy based control. All objects and systems have a sensitivity level assigned to them
Compare the security labels
Operational assurance requirements
Mandatory Access Control (MAC)
First evaluation class
43. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?
Storage and timing
Bell-LaPadula Model
Multiprocessing
The Trusted Computing Base (TCB)
44. The Simple Security rule is refered to as______________.
Types of covert channels
The "No read Up" rule
The security perimeter
The Thread (memory Management)
45. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Ring 0
B3 - Security Domains
Covert channels
Division D - Minimal Protection
46. The security kernel is the mechanism that _____________ of the reference monitor concept.
Access control to the objects by the subjects
Enforces the rules
Certification
Reduced Instruction Set Computers (RISC)
47. Which is an ISO standard product evaluation criteria that supersedes several different criteria
Government and military applications
Pipelining
The Common Criteria
Direct addressing
48. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.
The Rule is talking about writing
Virtual Memory
Ring 0
Its Clearance Label (Top Secret - Secret - or Confidential)
49. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Trusted Distribution
Be protected from modification
Storage and timing
Implement software or systems in a production environment
50. The Availability - Integrity and confidentiality requirements of multitasking operating systems
Controls the checks
State machine model
Simple Integrity Axiom
Protection Rings Support