Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






2. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






3. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






4. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






5. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






6. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






7. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






8. In the Bell-LaPadula Model the Object's Label contains ___________________.






9. Simpler instructions that require fewer clock cycles to execute.






10. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






11. The Physical memory address that the CPU uses






12. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






13. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






14. TCB contains The Security Kernel and all ______________.






15. The combination of RAM - Cache and the Processor Registers






16. What is called the formal acceptance of the adequacy of a system's overall security by management?






17. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






18. A domain of trust that shares a single security policy and single management






19. Trusted facility management is an assurance requirement only for ________________.






20. Used by Windows systems to reserve the "Swap Space"






21. Permits a database to have two records that are identical except for Their classifications






22. All users have a clearance for and a formal need to know about - all data processed with the system.






23. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






24. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






25. A type of memory used for High-speed writing and reading activities.






26. A system uses the Reference Monitor to ___________________ of a subject and an object?






27. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






28. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






29. Each data object must contain a classification label and each subject must have a clearance label.






30. The Availability - Integrity and confidentiality requirements of multitasking operating systems






31. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






32. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






33. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






34. Audit data must be captured and protected to enforce accountability






35. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






36. When the address location that is specified in the program instruction contains the address of the final desired location.






37. What access control technique is also known as multilevel security?






38. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






39. Users need to be Identified individually to provide more precise acces control and auditing functionality.






40. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






41. Contains the beginning address






42. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Succesfully Evaluated products are placed on?






44. When a portion of primary memory is accessed by specifying the actual address of the memory location






45. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






46. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






47. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






48. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






49. The assignment of a specific individual to administer the security-related functions of a system.






50. Involves sharing the processor amoung all ready processes