Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






2. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






3. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






4. What does the * (star) property mean in the Bell-LaPadula model?






5. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






6. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.






7. What model use an access control triples and requires that the system maintain separation of duty ?






8. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






9. Access control labels must be associated properly with objects.






10. TCSEC provides a means to evaluate ______________________.






11. What does the simple security (ss) property mean in the Bell-LaPadula model?






12. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






13. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?






14. Mandatory Protection






15. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






16. Data in Cache can be accessed much more quickly than Data






17. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






18. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.






19. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






20. Involves sharing the processor amoung all ready processes






21. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






22. Which would be designated as objects on a MAC system?






23. Another word for Primary storage and distinguishes physical memory from virtual memory.






24. All users have a clearance for and a formal need to know about - all data processed with the system.






25. Which in the Orange Book ratings represents the highest level of trust?






26. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






27. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






28. The Indexed memory addresses that software uses






29. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






30. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






31. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






32. The combination of RAM - Cache and the Processor Registers






33. Contains the ending address






34. What is called the formal acceptance of the adequacy of a system's overall security by management?






35. Individual subjects must be uniquely identified.






36. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






37. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system






38. When a portion of primary memory is accessed by specifying the actual address of the memory location






39. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






40. The Biba Model adresses _____________________.






41. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






42. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






43. In the Bell-LaPadula Model the Subject's Label contains ___________________.






44. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






45. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






46. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






47. Intended for environments that require systems to handle classified data.






48. What are the components of an object's sensitivity label?






49. Should always trace to individuals responsible for observing and recording the data






50. Permits a database to have two records that are identical except for Their classifications