Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when






2. The Availability - Integrity and confidentiality requirements of multitasking operating systems






3. The Physical memory address that the CPU uses






4. What model use an access control triples and requires that the system maintain separation of duty ?






5. Bell-LaPadula model was proposed for enforcing access control in _____________________.






6. In access control terms - the word "dominate" refers to ___________.






7. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






8. When a computer uses more than one CPU in parallel to execute instructions is known as?






9. TCSEC provides a means to evaluate ______________________.






10. Permits a database to have two records that are identical except for Their classifications






11. A type of memory used for High-speed writing and reading activities.






12. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






13. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






14. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






15. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






16. Which is a straightforward approach that provides access rights to subjects for objects?






17. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.






18. A domain of trust that shares a single security policy and single management






19. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






20. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






21. Which in the Orange Book ratings represents the highest level of trust?






22. Execute one instruction at a time.






23. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






24. Applications and user activity






25. Documentation must be provided - including test - design - and specification document - user guides and manuals






26. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






27. What does the simple security (ss) property mean in the Bell-LaPadula model?






28. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






29. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






30. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






31. Verification Protection






32. The total combination of protection mechanisms within a computer system






33. The Orange book requires protection against two_____________ - which are these Timing and Storage






34. Contains the ending address






35. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






36. When the address location that is specified in the program instruction contains the address of the final desired location.






37. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






38. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






39. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






40. The Indexed memory addresses that software uses






41. The Security Model Incorporates the ____________ that should be enforced in the system.






42. Happen because input data is not checked for appropriate length at time of input






43. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






44. What is called the formal acceptance of the adequacy of a system's overall security by management?






45. Audit data must be captured and protected to enforce accountability






46. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






47. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






48. A set of objects that a subject is able to access






49. Remaining parts of the operating system






50. The Reserved hard drive space used to to extend RAM capabilites.