Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Subjects and Objects cannot change their security levels once they have been instantiated (created)






2. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






3. What does the simple integrity axiom mean in the Biba model?






4. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






5. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






6. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






7. Which TCSEC level first addresses object reuse?






8. When a vendor submits a product for evaluation - it submits it to the ____________.






9. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






10. When a portion of primary memory is accessed by specifying the actual address of the memory location






11. What prevents a process from accessing another process' data?






12. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?






13. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






14. Which increases the performance in a computer by overlapping the steps of different instructions?






15. Trusted facility management is an assurance requirement only for ________________.






16. Audit data must be captured and protected to enforce accountability






17. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






18. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






19. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






20. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






21. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






22. When a computer uses more than one CPU in parallel to execute instructions is known as?






23. Succesfully Evaluated products are placed on?






24. Based on a known address with an offset value applied.






25. Applications and user activity






26. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






28. The Simple Security rule is refered to as______________.






29. The TCB is the ________________ within a computer system that work together to enforce a security policy.






30. Which uses Protection Profiles and Security Targets?






31. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






32. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






33. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






34. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






35. A subject at a given clearance may not read an object at a higher classification






36. What model use an access control triples and requires that the system maintain separation of duty ?






37. The Security Model Incorporates the ____________ that should be enforced in the system.






38. The Bell-LaPadula model Subjects and Objects are ___________.






39. Involves sharing the processor amoung all ready processes






40. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






42. Intended for environments that require systems to handle classified data.






43. Individual subjects must be uniquely identified.






44. A system uses the Reference Monitor to ___________________ of a subject and an object?






45. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.






46. The combination of RAM - Cache and the Processor Registers






47. The Indexed memory addresses that software uses






48. The security kernel is the mechanism that _____________ of the reference monitor concept.






49. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






50. Which in the Orange Book ratings represents the highest level of trust?