Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Biba Model adresses _____________________.






2. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






3. What does the Clark-Wilson security model focus on






4. Which TCSEC level first addresses object reuse?






5. All users have a clearance for and a formal need to know about - all data processed with the system.






6. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






7. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






8. The Availability - Integrity and confidentiality requirements of multitasking operating systems






9. Permits a database to have two records that are identical except for Their classifications






10. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






11. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






12. Audit data must be captured and protected to enforce accountability






13. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






14. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






15. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






16. Contains the beginning address






17. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.






18. Should always trace to individuals responsible for observing and recording the data






19. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






20. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






21. A type of memory used for High-speed writing and reading activities.






22. The Bell-LaPadula model Subjects and Objects are ___________.






23. Which is a straightforward approach that provides access rights to subjects for objects?






24. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






25. Trusted facility management is an assurance requirement only for ________________.






26. Another word for Primary storage and distinguishes physical memory from virtual memory.






27. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






28. System Architecture that separates system functionality into Hierarchical layers






29. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






30. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






31. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






32. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






33. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






34. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






35. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






36. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






37. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






38. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






39. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






40. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






41. Discretionary protection






42. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






43. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






44. Remaining parts of the operating system






45. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






46. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






47. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






48. What access control technique is also known as multilevel security?






49. Which uses Protection Profiles and Security Targets?






50. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?