Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The assignment of a specific individual to administer the security-related functions of a system.






2. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






4. The Orange book requires protection against two_____________ - which are these Timing and Storage






5. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






6. Used by Windows systems to reserve the "Swap Space"






7. A set of objects that a subject is able to access






8. Remaining parts of the operating system






9. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






10. I/O drivers and utilities






11. What model use an access control triples and requires that the system maintain separation of duty ?






12. Mediates all access and Functions between subjects and objects.






13. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






14. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






15. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






16. Mandatory Access requires that _____________ be attached to all objects.






17. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






18. A subject at a given clearance may not read an object at a higher classification






19. A system uses the Reference Monitor to ___________________ of a subject and an object?






20. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






21. All users have a clearance for and a formal need to know about - all data processed with the system.






22. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






23. Happen because input data is not checked for appropriate length at time of input






24. Which is an ISO standard product evaluation criteria that supersedes several different criteria






25. What is called the formal acceptance of the adequacy of a system's overall security by management?






26. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






27. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






28. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






29. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






30. Simpler instructions that require fewer clock cycles to execute.






31. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






32. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






33. Applications and user activity






34. Access control labels must be associated properly with objects.






35. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






36. Bell-LaPadula model was proposed for enforcing access control in _____________________.






37. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






38. The group that oversees the processes of evaluation within TCSEC is?






39. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities






40. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






41. Execute one instruction at a time.






42. Documentation must be provided - including test - design - and specification document - user guides and manuals






43. The Reserved hard drive space used to to extend RAM capabilites.






44. What access control technique is also known as multilevel security?






45. The total combination of protection mechanisms within a computer system






46. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






47. Users need to be Identified individually to provide more precise acces control and auditing functionality.






48. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






49. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






50. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)