Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






2. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






3. A domain of trust that shares a single security policy and single management






4. Happen because input data is not checked for appropriate length at time of input






5. In the Bell-LaPadula Model the Subject's Label contains ___________________.






6. The total combination of protection mechanisms within a computer system






7. Which increases the performance in a computer by overlapping the steps of different instructions?






8. Mandatory Access requires that _____________ be attached to all objects.






9. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






10. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






11. The Bell-LaPadula model Subjects and Objects are ___________.






12. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






13. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






14. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






15. The assignment of a specific individual to administer the security-related functions of a system.






16. In access control terms - the word "dominate" refers to ___________.






17. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






18. A Policy based control. All objects and systems have a sensitivity level assigned to them






19. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






20. Each data object must contain a classification label and each subject must have a clearance label.






21. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






22. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






23. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






24. Which TCSEC level first addresses object reuse?






25. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






26. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






27. TCB contains The Security Kernel and all ______________.






28. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






29. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






30. What does the * (star) property mean in the Bell-LaPadula model?






31. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






32. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






33. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






34. The subject must have Need to Know for ONLY the information they are trying to access.






35. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






36. What access control technique is also known as multilevel security?






37. Succesfully Evaluated products are placed on?






38. Should always trace to individuals responsible for observing and recording the data






39. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






40. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






41. The Simple Security rule is refered to as______________.






42. What does the simple integrity axiom mean in the Biba model?






43. Applications and user activity






44. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






45. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






46. System Architecture that separates system functionality into Hierarchical layers






47. Access control labels must be associated properly with objects.






48. The Orange book does NOT Cover ________________ - And Database management systems






49. The Biba Model adresses _____________________.






50. Trusted facility management is an assurance requirement only for ________________.