SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Trusted facility management is an assurance requirement only for ________________.
Disclosure of residual data
Operational assurance requirements
The trustworthiness of an information system
Highly secure systems (B2 - B3 and A1)
2. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
A1 - Rating
B3
Invocation Property
Orange Book - B3
3. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Clark-Wilson
C1 - Discretionary Security Protection
The Common Criteria
Accountability - Orange Book
4. The group that oversees the processes of evaluation within TCSEC is?
Secondary Storage
Trusted Products Evaluation Program (TPEP)
Cache Memory
Thrashing
5. A subject at a given clearance may not read an object at a higher classification
Pagefile.sys file
The Simple Security Property
The National Computer Security Center (NCSC)
Secondary Storage
6. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
C2 - Controlled Access Protection
Pagefile.sys file
Division B - Mandatory Protection Architecture
Ring 2
7. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
The Tranqulity principle (The Bell-LaPadula Model)
Polyinstantiation
attributability
8. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.
Primary storage
All Mandatory Access Control (MAC) systems
A lattice of Intergrity Levels
Types of covert channels
9. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Orange Book - B3
Ring 3
Networks and Communications
Certification
10. As per FDA data should be ______________________________.
The Evaluated Products List (EPL) with their corresponding rating
C2
Attributable - original - accurate - contemporaneous and legible
Orange Book - D
11. Documentation must be provided - including test - design - and specification document - user guides and manuals
The Rule is talking about writing
Sensitivity labels
Documentation - Orange Book
All Mandatory Access Control (MAC) systems
12. All users have a clearance for and a formal need to know about - all data processed with the system.
Indirect addressing
Clark-Wilson Model
Absolute addresses
Dedicated Security Mode
13. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
The security perimeter
Evaluated separately
Polyinstantiation
Orange Book - B3
14. The TCB is the ________________ within a computer system that work together to enforce a security policy.
Totality of protection mechanisms
Physical security
C2 - Controlled Access Protection
Division D - Minimal Protection
15. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Stored in Reak Memory
Its Clearance Label (Top Secret - Secret - or Confidential)
Disclosure of residual data
C2 - Controlled Access Protection
16. Mandatory Access requires that _____________ be attached to all objects.
Buffer overflows
Sensitivity labels
Ring 1
Secondary Storage
17. Which increases the performance in a computer by overlapping the steps of different instructions?
Division C - Discretionary Protection
Indirect addressing
Pipelining
Certification
18. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity
No read down
Invocation Property
Life-cycle assurance - O/B
Division B - Mandatory Protection
19. Contains the ending address
TCB (Trusted Computing Base)
Multilevel Security Policies
A Limit Register (Memory Management)
Direct Addressing
20. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
A Limit Register (Memory Management)
Firmware
The Common Criteria
The Security Kernel
21. Mandatory access control is enfored by the use of security labels.
Division B - Mandatory Protection
Trusted Products Evaluation Program (TPEP)
Prohibits
Division D - Minimal Protection
22. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.
Buffer (temporary data storage area)
The *-Property rule (Star property)
A security kernel
Multilevel Security Policies
23. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The reference monitor
The Simple Security Property
International Standard 15408
Division C - Discretionary Protection
24. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
Thrashing
C2 - Controlled Access Protection
The Biba Model
Controlling unauthorized downgrading of information
25. Minimal Security
Covert channels
Orange Book - D
The Biba Model
B3 - Security Domains
26. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Orange Book - D
Programmable Read-Only Memory (PROM)
Orange Book interpretations
Totality of protection mechanisms
27. What does the Clark-Wilson security model focus on
Access Matrix model
Orange Book C
Division B - Mandatory Protection
Integrity
28. In the Bell-LaPadula Model the Subject's Label contains ___________________.
All Mandatory Access Control (MAC) systems
Trusted Distribution
First evaluation class
Its Clearance Label (Top Secret - Secret - or Confidential)
29. In the Bell-LaPadula Model the Object's Label contains ___________________.
Its classification label (Top Secret - Secret or confidential)
Trusted facility management
Networks and Communications
Programmable Read-Only Memory (PROM)
30. In ______________ the subject must have: Need to Know for ALL the information contained within the system.
Trusted Network Interpretation (TNI)
B3
Dedicated Security Mode
Orange Book B
31. Applications and user activity
Orange Book ratings
A Limit Register (Memory Management)
Mandatory Access Control (MAC)
Ring 3
32. What access control technique is also known as multilevel security?
Multilevel Security Policies
The security perimeter
Scalar processors
Mandatory access control
33. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
The Tranqulity principle (The Bell-LaPadula Model)
Orange Book - B3
In C2 - Controlled Access Protection environment
Pipelining
34. Permits a database to have two records that are identical except for Their classifications
Polyinstantiation
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
A Domain
Controls the checks
35. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Bell-LaPadula Model
Relative Addresses
Covert channels
Mandatory Access Control (MAC)
36. What model use an access control triples and requires that the system maintain separation of duty ?
The Monolithic Operation system Architecture
First evaluation class
The Rule is talking about writing
Clark-Wilson
37. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Operational assurance requirements
Division D - Minimal Protection
Highly secure systems (B2 - B3 and A1)
The Trusted Computing Base (TCB)
38. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Models concerned with integrity
Clark-Wilson Model
B1
A Thread
39. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Highly secure systems (B2 - B3 and A1)
The Evaluated Products List (EPL) with their corresponding rating
The Strong star property rule
A security domain
40. The Bell-LaPadula model Subjects and Objects are ___________.
Certification
Assigned labels
Orange Book interpretations
The Biba Model
41. A Policy based control. All objects and systems have a sensitivity level assigned to them
Mandatory Access Control (MAC)
D
Firmware
Stored in Reak Memory
42. The Security Model Incorporates the ____________ that should be enforced in the system.
Totality of protection mechanisms
A1
Security Policy
Labels - Orange Book
43. What is called the formal acceptance of the adequacy of a system's overall security by management?
Logical addresses
Life Cycle Assurance Requirement
Operational assurance requirements
Accreditation
44. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Logical addresses
State machine model
The Red Book
45. The combination of RAM - Cache and the Processor Registers
Primary storage
Virtual Memory
Examples of Layered Operating Systems
C1
46. Succesfully Evaluated products are placed on?
The Evaluated Products List (EPL) with their corresponding rating
Mandatory Access Control (MAC)
Absolute addresses
A Base Register (Memory Management)
47. Access control labels must be associated properly with objects.
Integrity
Firmware
Labels - Orange Book
Ring 2
48. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
A Thread
Covert channels
A Layered Operating System Architecure
Most commonly used approach
49. Which TCSEC level first addresses object reuse?
C2
B2 rating
The Integrity of data within applications
Life Cycle Assurance Requirement
50. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Execution Domain
The TCSEC - Aka Orange Book
Dedicated Security Mode
B3 - Security Domains