SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Indexed memory addresses that software uses
Logical addresses
Orange Book ratings
Storage and timing
Certification
2. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
Reduced Instruction Set Computers (RISC)
First evaluation class
Relative Addresses
A and B
3. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.
Orange Book ratings
The Strong star property rule
A1
Physical security
4. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Swap Space
Life-cycle assurance - O/B
Documentation - Orange Book
Real storage
5. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
C1 - Discretionary Security Protection
Dedicated Security Mode
Integrity
Dominate the object's sensitivity label
7. Remaining parts of the operating system
Ring 1
The security perimeter
The Common Criteria
Networks and Communications
8. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Life Cycle Assurance Requirement
The *-Property rule (Star property)
Orange Book - B3
security protection mechanisms
9. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Covert channels
Models concerned with integrity
Virtual storage
Firmware
10. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Certification
The trustworthiness of an information system
Buffer overflows
Continuous protection - O/B
11. Contains the ending address
Protection Rings Support
Identification - Orange Book
A Limit Register (Memory Management)
Security Policy
12. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
All Mandatory Access Control (MAC) systems
The Trusted Computing Base (TCB)
In C2 - Controlled Access Protection environment
Ring 1
13. What is called the formal acceptance of the adequacy of a system's overall security by management?
Access control to the objects by the subjects
Accreditation
Ring 0
Access Matrix model
14. Access control labels must be associated properly with objects.
Labels - Orange Book
The Biba Model
Ring 0
Security Policy is clearly defined and documented
15. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Virtual storage
The "No read Up" rule
Most commonly used approach
B3 - Security Domains
16. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Mandatory Access Control (MAC)
Trusted Network Interpretation (TNI)
Security Policy - Orange Book
Buffer (temporary data storage area)
17. Which in the Orange Book ratings represents the highest level of trust?
Government and military applications
A and B
D
B2
18. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
The Common Criteria
Trusted hardware - Software and Firmware
Orange Book interpretations
A1
19. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Discretionary Security Property (ds-property)
Simple Integrity Axiom
Isolate processes
A Limit Register (Memory Management)
20. In which users are processing information at the same sensitivity level; thus - strict access control and auditing measures are not required. It would be a trusted envirnment with low security concerns.
C1 - Discrection Security Protection is a type of environment
The Thread (memory Management)
Orange Book interpretations
The Red Book
21. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
C2 - Controlled Access Protection
The Trusted Computing Base (TCB)
Mandatory Access Control (MAC)
C2
22. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
The "No write Down" Rule
D
Pagefile.sys file
The Tranqulity principle (The Bell-LaPadula Model)
23. Each data object must contain a classification label and each subject must have a clearance label.
Erasable and Programmable Read-Only Memory (EPROM)
B1 - Labeled Security
Ring 2
Security Policy - Orange Book
24. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
C2
Integrity
Basic Security Theorem (used in computer science) definition
In C2 - Controlled Access Protection environment
25. Applications and user activity
Ring 3
Overt channel
Division D - Minimal Protection
The Strong star property rule
26. Mediates all access and Functions between subjects and objects.
B3
The Security Kernel
Direct Addressing
Multitasking
27. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Direct addressing
Controlling unauthorized downgrading of information
Need-to-know
Labels - Orange Book
28. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Simple Security Rule
*-Integrity Axiom
Security Policy - Orange Book
The Security Kernel
29. When the contents of the address defined in the program's instruction is added to that of an index register.
Complex Instruction Set Computers (CISC)
Discretionary Security Property (ds-property)
Indexed addressing
The trustworthiness of an information system
30. What does the simple integrity axiom mean in the Biba model?
No read down
Orange Book - B3
No write down
Orange Book interpretations
31. A domain of trust that shares a single security policy and single management
Execution Domain
Pipelining
A security domain
The "No read Up" rule
32. Which TCSEC level first addresses object reuse?
A security domain
Orange Book - D
Direct Addressing
C2
33. Execute one instruction at a time.
Scalar processors
Multiprocessing
C2
In C2 - Controlled Access Protection environment
34. The Orange book does NOT Cover ________________ - And Database management systems
Complex Instruction Set Computers (CISC)
Ring 1
Networks and Communications
Division B - Mandatory Protection
35. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
System High Security Mode
Most commonly used approach
Scalar processors
Need-to-know
36. Should always trace to individuals responsible for observing and recording the data
Division B - Mandatory Protection
The security perimeter
Attributable data
Reduced Instruction Set Computers (RISC)
37. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
The *-Property rule (Star property)
C2 - Controlled Access Protection
Execution Domain
A Thread
38. Mandatory Access requires that _____________ be attached to all objects.
B3
Sensitivity labels
Assigned labels
The "No read Up" rule
39. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Orange Book - A1
Multilevel Security Policies
Compare the security labels
The Thread (memory Management)
40. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Security rating B
Orange Book - B3
Constrained
Controlling unauthorized downgrading of information
41. What model use an access control triples and requires that the system maintain separation of duty ?
Clark-Wilson
Execution Domain
Networks and Communications
The *-Property rule (Star property)
42. Used by Windows systems to reserve the "Swap Space"
Division B - Mandatory Protection Architecture
The rule is talking about "Reading"
Pagefile.sys file
In C2 - Controlled Access Protection environment
43. If a system initializes in a secure state and all allowed state transitions are secure - the every subsequent state will be secure no matter what inputs occur.
Basic Security Theorem (used in computer science) definition
A Thread
C2 - Controlled Access Protection
A1
44. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Execution Domain
The *-Property rule (Star property)
Invocation Property
Buffer (temporary data storage area)
45. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Need-to-know
A lattice of Intergrity Levels
An abstract machine
The Common Criteria
46. Operating System Kernel
The Integrity of data within applications
Orange Book B
Labels - Orange Book
Ring 0
47. Verification Protection
Cache Memory
Orange Book A
Swap Space
A and B
48. Happen because input data is not checked for appropriate length at time of input
Cache Memory
Buffer overflows
C2 - Controlled Access Protection
Orange Book interpretations
49. The *-Property rule is refered to as ____________.
The "No write Down" Rule
Life Cycle Assurance Requirement
Security Policy - Orange Book
Totality of protection mechanisms
50. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
A1 - Rating
Orange Book - D
Controls the checks
The Trusted Computing Base (TCB)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests