SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
'Dominate'
The Clark Wilson integrity model
Security Policy is clearly defined and documented
Orange Book - B3
2. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs
Stored in Reak Memory
Swap Space
Secondary Storage
The Strong star property rule
3. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The *-Property rule (Star property)
The Red Book
Mandatory Access Control (MAC)
The security perimeter
4. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
*-Integrity Axiom
Complex Instruction Set Computers (CISC)
The Evaluated Products List (EPL) with their corresponding rating
The Thread (memory Management)
5. Applications and user activity
Ring 3
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The Rule is talking about writing
TCB (Trusted Computing Base)
6. Trusted facility management is an assurance requirement only for ________________.
Highly secure systems (B2 - B3 and A1)
A and B
Complex Instruction Set Computers (CISC)
B3
7. The subject must have Need to Know for ONLY the information they are trying to access.
System High Security Mode
Be protected from modification
A lattice of Intergrity Levels
The Monolithic Operation system Architecture
8. A set of objects that a subject is able to access
Integrity
A Domain
Trusted facility management
The Tranqulity principle (The Bell-LaPadula Model)
9. Execute one instruction at a time.
Government and military applications
A and B
Scalar processors
Integrity
10. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
In C2 - Controlled Access Protection environment
Scalar processors
Prohibits
The Trusted Computing Base (TCB)
11. In the Bell-LaPadula Model the Subject's Label contains ___________________.
B3 - Rating
Its Clearance Label (Top Secret - Secret - or Confidential)
Programmable Read-Only Memory (PROM)
Clark-Wilson Model
12. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Continuous protection - O/B
Access Matrix model
The "No write Down" Rule
Virtual Memory
13. Mandatory Protection
security protection mechanisms
Orange Book B
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Operational assurance requirements
14. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
Access control to the objects by the subjects
The Trusted Computing Base (TCB)
Government and military applications
Orange Book - A1
15. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Security rating B
Access Matrix model
Process isolation
The Biba Model
16. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?
Life Cycle Assurance Requirement
B1 - Labeled Security rating
The Clark Wilson integrity model
The Monolithic Operation system Architecture
17. Operating System Kernel
Direct Addressing
Ring 0
Implement software or systems in a production environment
C1 - Discrection Security Protection is a type of environment
18. Based on a known address with an offset value applied.
Relative Addresses
The security kernel
A Layered Operating System Architecure
Swap Space
19. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
Virtual Memory
B3
Process isolation
Controls the checks
20. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
No read down
The Common Criteria
B3
Its classification label (Top Secret - Secret or confidential)
21. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction
B3 - Security Domains
Primary storage
Security rating B
Clark-Wilson Model
22. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Documentation - Orange Book
B1
No read up
C1 - Discretionary Security Protection
23. The C2 evaluation class of the _________________ offers controlled access protection.
Controlling unauthorized downgrading of information
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Pipelining
Trusted Network Interpretation (TNI)
24. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
Ring 0
Documentation - Orange Book
The Monolithic Operation system Architecture
Division B - Mandatory Protection
25. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
Indirect addressing
attributability
Security Policy - Orange Book
The National Computer Security Center (NCSC)
26. The Indexed memory addresses that software uses
The Trusted Computing Base (TCB)
C2
Logical addresses
TCB (Trusted Computing Base)
27. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Need-to-know
Constrained
Sensitivity labels
Higher or equal to access class
28. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Division C - Discretionary Protection
First evaluation class
Programmable Read-Only Memory (PROM)
The Monolithic Operation system Architecture
29. When a vendor submits a product for evaluation - it submits it to the ____________.
State machine model
The National Computer Security Center (NCSC)
Buffer (temporary data storage area)
C1 - Discretionary Security Protection
30. Contains an Address of where the instruction and dara reside that need to be processed.
Isolate processes
Firmware
The Thread (memory Management)
Swap Space
31. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Orange Book B
Storage and timing
Implement software or systems in a production environment
Buffer (temporary data storage area)
32. What access control technique is also known as multilevel security?
Subject to Object Model
Division B - Mandatory Protection Architecture
Access Matrix model
Mandatory access control
33. All users have a clearance for and a formal need to know about - all data processed with the system.
Higher or equal to access class
The Trusted Computing Base (TCB)
Dedicated Security Mode
Orange Book C
34. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"
attributability
Simple Integrity Axiom
Higher or equal to access class
The Monolithic Operation system Architecture
35. The Bell-LaPadula model Subjects and Objects are ___________.
Access Matrix model
Life Cycle Assurance Requirement
Assigned labels
C2
36. Subjects and Objects cannot change their security levels once they have been instantiated (created)
A and B
Orange Book ratings
The Tranqulity principle (The Bell-LaPadula Model)
The Common Criteria
37. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Models concerned with integrity
B1 - Labeled Security rating
Basic Security Theorem (used in computer science) definition
Execution Domain
38. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
The Clark Wilson integrity model
Dedicated Security Mode
Administrative declaration
Simple Integrity Axiom
39. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Isolate processes
B2 rating
Virtual Memory
International Standard 15408
40. The Orange book requires protection against two_____________ - which are these Timing and Storage
Types of covert channels
Trusted Network Interpretation (TNI)
Execution Domain
Labels - Orange Book
41. The Bell-LaPadula Model is a _______________.
Subject to Object Model
Prohibits
The security perimeter
The *-Property rule (Star property)
42. Data in Cache can be accessed much more quickly than Data
Isolate processes
Disclosure of residual data
Stored in Reak Memory
Buffer (temporary data storage area)
43. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
A1
Certification
The *-Property rule (Star property)
Execution Domain
44. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
C2 - Controlled Access Protection
B1 - Labeled Security
The rule is talking about "Reading"
A Thread
45. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu
Swap Space
Security Policy is clearly defined and documented
B3 - Security Domains
A Base Register (Memory Management)
46. Users need to be Identified individually to provide more precise acces control and auditing functionality.
Indexed addressing
C2
C2 - Controlled Access Protection
Prevent secret information from being accessed
47. The assignment of a specific individual to administer the security-related functions of a system.
The *-Property rule (Star property)
Examples of Layered Operating Systems
Complex Instruction Set Computers (CISC)
Trusted facility management
48. Which TCSEC level first addresses object reuse?
A lattice of Intergrity Levels
C2
Firmware
The *-Property rule (Star property)
49. As per FDA data should be ______________________________.
Swap Space
Secondary Storage
Indirect addressing
Attributable - original - accurate - contemporaneous and legible
50. Mandatory access control is enfored by the use of security labels.
Enforces the rules
Division B - Mandatory Protection
A1
Trusted Distribution