Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Subjects and Objects cannot change their security levels once they have been instantiated (created)






2. Which is an ISO standard product evaluation criteria that supersedes several different criteria






3. Which TCSEC level first addresses object reuse?






4. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






5. TCSEC provides a means to evaluate ______________________.






6. In access control terms - the word "dominate" refers to ___________.






7. Permits a database to have two records that are identical except for Their classifications






8. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






9. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






10. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






11. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






12. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






13. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






14. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






15. Which increases the performance in a computer by overlapping the steps of different instructions?






16. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






17. When a vendor submits a product for evaluation - it submits it to the ____________.






18. The combination of RAM - Cache and the Processor Registers






19. When a portion of primary memory is accessed by specifying the actual address of the memory location






20. In the Bell-LaPadula Model the Object's Label contains ___________________.






21. Used by Windows systems to reserve the "Swap Space"






22. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






23. Which in the Orange Book ratings represents the highest level of trust?






24. The Simple Security rule is refered to as______________.






25. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






26. Mandatory Protection






27. Audit data must be captured and protected to enforce accountability






28. The Indexed memory addresses that software uses






29. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






30. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






31. What does the * (star) property mean in the Bell-LaPadula model?






32. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






33. Which Orange Book evaluation level is described as "Verified Design"?






34. Which can be used as a covert channel?






35. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






36. I/O drivers and utilities






37. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






38. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






39. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






40. TCB contains The Security Kernel and all ______________.






41. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






42. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






43. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






44. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






45. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






46. A subject at a given clearance may not read an object at a higher classification






47. Can be erased - modified and upgraded.






48. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






49. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






50. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when