SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCB contains The Security Kernel and all ______________.
The Strong star property rule
security protection mechanisms
A and B
An abstract machine
2. When the RAM and secondary storage are combined the result is __________.
Orange Book - B3
Virtual Memory
No write down
Life Cycle Assurance Requirement
3. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
A lattice of Intergrity Levels
Physical security
Security Policy
The Biba Model
4. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Process isolation
Security Policy is clearly defined and documented
Discretionary Security Property (ds-property)
Simple Security Rule
5. The total combination of protection mechanisms within a computer system
TCB (Trusted Computing Base)
B3 - Rating
Relative Addresses
A Layered Operating System Architecure
6. Audit data must be captured and protected to enforce accountability
B3
Storage and timing
Indexed addressing
Accountability - Orange Book
7. The Physical memory address that the CPU uses
Disclosure of residual data
The Security Kernel
Process isolation
Absolute addresses
8. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
The "No write Down" Rule
C1 - Discrection Security Protection is a type of environment
No read up
Disclosure of residual data
9. Data in Cache can be accessed much more quickly than Data
Stored in Reak Memory
Mandatory Access Control (MAC)
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Reduced Instruction Set Computers (RISC)
10. Contains an Address of where the instruction and dara reside that need to be processed.
The Security Kernel
Documentation - Orange Book
The Thread (memory Management)
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
11. The Indexed memory addresses that software uses
Totality of protection mechanisms
Compare the security labels
Covert channels
Logical addresses
12. Minimal Security
Virtual storage
The security perimeter
Orange Book - D
Orange Book - B3
13. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Be protected from modification
The National Computer Security Center (NCSC)
Stored in Reak Memory
Orange Book interpretations
14. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
B3
Sensitivity labels
Security mechanisms and evalautes their effectivenes
Real storage
15. A type of memory used for High-speed writing and reading activities.
Isolate processes
No write down
Cache Memory
Absolute addresses
16. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
Mandatory access control
Invocation Property
C2 - Controlled Access Protection
The security perimeter
17. What prevents a process from accessing another process' data?
Erasable and Programmable Read-Only Memory (EPROM)
Process isolation
Overt channel
Trusted Network Interpretation (TNI)
18. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
D
Physical security
Basic Security Theorem (used in computer science) definition
The Thread (memory Management)
19. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle
The National Computer Security Center (NCSC)
Prohibits
Complex Instruction Set Computers (CISC)
All Mandatory Access Control (MAC) systems
20. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Most commonly used approach
Real storage
C2 - Controlled Access Protection
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
21. Mandatory access control is enfored by the use of security labels.
Prevent secret information from being accessed
Administrative declaration
The Clark Wilson integrity model
Division B - Mandatory Protection
22. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Virtual Memory
NOT Integrity
Trusted Distribution
The security kernel
23. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
A Domain
Security mechanisms and evalautes their effectivenes
The security perimeter
Accreditation
24. Which is an ISO standard product evaluation criteria that supersedes several different criteria
B1 - Labeled Security
Models concerned with integrity
C2
The Common Criteria
25. Based on a known address with an offset value applied.
Relative Addresses
Attributable - original - accurate - contemporaneous and legible
Orange Book - D
Stored in Reak Memory
26. What does the simple integrity axiom mean in the Biba model?
No read down
Buffer overflows
C2 - Controlled Access Protection
The Red Book
27. Trusted facility management is an assurance requirement only for ________________.
Documentation - Orange Book
Cache Memory
Highly secure systems (B2 - B3 and A1)
Be protected from modification
28. What does the * (star) property mean in the Bell-LaPadula model?
Logical addresses
Direct Addressing
Firmware
No write down
29. What model use an access control triples and requires that the system maintain separation of duty ?
Prevent secret information from being accessed
The "No write Down" Rule
Pipelining
Clark-Wilson
30. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
Orange Book - B3
The Integrity of data within applications
Dedicated Security Mode
Simple Integrity Axiom
31. A subject at a given clearance may not read an object at a higher classification
Overt channel
The Simple Security Property
A security domain
Thrashing
32. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
A Thread
Documentation - Orange Book
attributability
Reduced Instruction Set Computers (RISC)
33. The Policy must be explicit and well defined and enforced by the mechanisms within the system
The Tranqulity principle (The Bell-LaPadula Model)
Attributable - original - accurate - contemporaneous and legible
The Biba Model
Security Policy - Orange Book
34. Simpler instructions that require fewer clock cycles to execute.
Virtual storage
The Evaluated Products List (EPL) with their corresponding rating
Reduced Instruction Set Computers (RISC)
State machine model
35. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Simple Security Rule
Dedicated Security Mode
The rule is talking about "Reading"
A security domain
36. System Architecture that separates system functionality into Hierarchical layers
System High Security Mode
Simple Security Rule
A Layered Operating System Architecure
Ring 3
37. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
The rule is talking about "Reading"
Physical security
Virtual storage
Trusted hardware - Software and Firmware
38. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Division D - Minimal Protection
A Layered Operating System Architecure
C2
Division B - Mandatory Protection Architecture
39. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Execution Domain
Trusted facility management
Dominate the object's sensitivity label
Primary storage
40. Mediates all access and Functions between subjects and objects.
The Security Kernel
The National Computer Security Center (NCSC)
A security kernel
Security Policy - Orange Book
41. The Bell-LaPadula model Subjects and Objects are ___________.
Assigned labels
Execution Domain
Simple Security Rule
Examples of Layered Operating Systems
42. Mandatory Protection
Files - directories and devices
Orange Book B
Life Cycle Assurance Requirement
A security kernel
43. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The Trusted Computing Base (TCB)
The Monolithic Operation system Architecture
Direct Addressing
A1 - Rating
44. Which describe a condition when RAM and Secondary storage are used together?
Security Policy is clearly defined and documented
Buffer overflows
The Trusted Computing Base (TCB)
Virtual storage
45. In access control terms - the word "dominate" refers to ___________.
Identification - Orange Book
'Dominate'
Higher or equal to access class
The Red Book
46. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Networks and Communications
Simple Security Rule
Life-cycle assurance - O/B
A1
47. Used by Windows systems to reserve the "Swap Space"
Attributable - original - accurate - contemporaneous and legible
A Limit Register (Memory Management)
Need-to-know
Pagefile.sys file
48. The combination of RAM - Cache and the Processor Registers
Execution Domain
Primary storage
Orange Book interpretations
Controls the checks
49. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
Types of covert channels
Higher or equal to access class
The National Computer Security Center (NCSC)
B3 - Rating
50. Which Orange Book evaluation level is described as "Discretionary Security Protection"?
The Monolithic Operation system Architecture
C1
Examples of Layered Operating Systems
Access Matrix model