Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In the Bell-LaPadula Model the Object's Label contains ___________________.






2. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






3. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






4. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






5. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






6. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






7. The TCB is the ________________ within a computer system that work together to enforce a security policy.






8. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






9. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






10. Based on a known address with an offset value applied.






11. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






12. Permits a database to have two records that are identical except for Their classifications






13. In access control terms - the word "dominate" refers to ___________.






14. The Bell-LaPadula Model is a _______________.






15. Which increases the performance in a computer by overlapping the steps of different instructions?






16. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






17. As per FDA data should be ______________________________.






18. When a vendor submits a product for evaluation - it submits it to the ____________.






19. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






20. What access control technique is also known as multilevel security?






21. The Reserved hard drive space used to to extend RAM capabilites.






22. Operating System Kernel






23. Applications and user activity






24. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






25. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






26. When a computer uses more than one CPU in parallel to execute instructions is known as?






27. Remaining parts of the operating system






28. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






29. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






30. Subjects and Objects cannot change their security levels once they have been instantiated (created)






31. Verification Protection






32. The Physical memory address that the CPU uses






33. TCSEC provides a means to evaluate ______________________.






34. In the Bell-LaPadula Model the Subject's Label contains ___________________.






35. The Orange book requires protection against two_____________ - which are these Timing and Storage






36. Succesfully Evaluated products are placed on?






37. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






38. Which TCSEC level first addresses object reuse?






39. Which would be designated as objects on a MAC system?






40. A system uses the Reference Monitor to ___________________ of a subject and an object?






41. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






42. What are the components of an object's sensitivity label?






43. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






44. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






45. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






46. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






47. Users need to be Identified individually to provide more precise acces control and auditing functionality.






48. The Biba Model adresses _____________________.






49. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






50. All users have a clearance for and a formal need to know about - all data processed with the system.