SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating System Kernel
Dedicated Security Mode
Basic Security Theorem (used in computer science) definition
The *-Property rule (Star property)
Ring 0
2. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.
The security perimeter
Division B - Mandatory Protection
Prevent secret information from being accessed
Orange Book interpretations
3. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
A1 - Rating
Orange Book - D
The Monolithic Operation system Architecture
Controlling unauthorized downgrading of information
4. The assignment of a specific individual to administer the security-related functions of a system.
Government and military applications
C2 - Controlled Access Protection
Trusted facility management
International Standard 15408
5. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Basic Security Theorem (used in computer science) definition
Security rating B
Thrashing
The Biba Model
6. Which Orange Book evaluation level is described as "Verified Design"?
Orange Book - B2
A1
Dominate the object's sensitivity label
A Thread
7. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Physical security
Ring 3
Security mechanisms and evalautes their effectivenes
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
8. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
A lattice of Intergrity Levels
Division B - Mandatory Protection Architecture
No read up
9. Involves sharing the processor amoung all ready processes
Prevent secret information from being accessed
Scalar processors
Multitasking
Disclosure of residual data
10. The Bell-LaPadula Model is a _______________.
Orange Book - B2
B3
Subject to Object Model
A Base Register (Memory Management)
11. What is called the formal acceptance of the adequacy of a system's overall security by management?
Division B - Mandatory Protection
Accreditation
Its classification label (Top Secret - Secret or confidential)
Multitasking
12. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
Overt channel
B3 - Security Domains
Controlling unauthorized downgrading of information
Evaluated separately
13. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
The security perimeter
In C2 - Controlled Access Protection environment
Its classification label (Top Secret - Secret or confidential)
D
14. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Trusted hardware - Software and Firmware
Its Clearance Label (Top Secret - Secret - or Confidential)
Erasable and Programmable Read-Only Memory (EPROM)
Ring 1
15. Users need to be Identified individually to provide more precise acces control and auditing functionality.
C2 - Controlled Access Protection
Evaluated separately
A Thread
B2
16. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object
In C2 - Controlled Access Protection environment
C1 - Discretionary Security Protection
Access control to the objects by the subjects
Be protected from modification
17. Intended for environments that require systems to handle classified data.
Orange Book - A1
Integrity
B1 - Labeled Security rating
Types of covert channels
18. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
NOT Integrity
First evaluation class
Attributable data
Security Policy is clearly defined and documented
19. What does the simple security (ss) property mean in the Bell-LaPadula model?
No read up
C2 - Controlled Access Protection
The Monolithic Operation system Architecture
A lattice of Intergrity Levels
20. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
Security mechanisms and evalautes their effectivenes
Disclosure of residual data
A1 - Rating
A Base Register (Memory Management)
21. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Cache Memory
Its Clearance Label (Top Secret - Secret - or Confidential)
No read up
23. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
A Layered Operating System Architecure
Overt channel
A1 - Rating
The rule is talking about "Reading"
24. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Relative Addresses
The TCSEC - Aka Orange Book
Orange Book interpretations
Constrained
25. Each data object must contain a classification label and each subject must have a clearance label.
The Clark Wilson integrity model
B1 - Labeled Security
Basic Security Theorem (used in computer science) definition
Controls the checks
26. Access control labels must be associated properly with objects.
Labels - Orange Book
A lattice of Intergrity Levels
Enforces the rules
Direct Addressing
27. Mandatory access control is enfored by the use of security labels.
Indexed addressing
The Biba Model
Division B - Mandatory Protection
Programmable Read-Only Memory (PROM)
28. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Division D - Minimal Protection
Virtual storage
Thrashing
Overt channel
29. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Relative Addresses
NOT Integrity
Security mechanisms and evalautes their effectivenes
Continuous protection - O/B
30. What are the components of an object's sensitivity label?
Logical addresses
B1
A single classification and a Compartment Set
Sensitivity labels
31. The Orange book does NOT Cover ________________ - And Database management systems
The Common Criteria
Models concerned with integrity
Division B - Mandatory Protection
Networks and Communications
32. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.
The Evaluated Products List (EPL) with their corresponding rating
Most commonly used approach
B1 - Labeled Security
Files - directories and devices
33. What does the Clark-Wilson security model focus on
Access Matrix model
Primary storage
Integrity
Pagefile.sys file
34. The Biba Model adresses _____________________.
Life Cycle Assurance Requirement
The Integrity of data within applications
C1 - Discretionary Security Protection
Be protected from modification
35. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The Red Book
The Rule is talking about writing
A lattice of Intergrity Levels
D
36. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.
Controls the checks
Storage and timing
A Limit Register (Memory Management)
Prevent secret information from being accessed
37. Should always trace to individuals responsible for observing and recording the data
A single classification and a Compartment Set
Attributable data
Division D - Minimal Protection
Direct Addressing
38. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Constrained
B3
Overt channel
An abstract machine
39. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
The TCSEC - Aka Orange Book
Direct Addressing
B2 rating
Simple Integrity Axiom
40. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.
Evaluated separately
C2 - Controlled Access Protection
Accountability - Orange Book
Erasable and Programmable Read-Only Memory (EPROM)
41. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Basic Security Theorem (used in computer science) definition
The National Computer Security Center (NCSC)
Orange Book - A1
Ring 2
42. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.
The rule is talking about "Reading"
Dominate the object's sensitivity label
A1
The Simple Security Property
43. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)
Trusted Products Evaluation Program (TPEP)
*-Integrity Axiom
Virtual storage
Physical security
44. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Security Policy
Buffer (temporary data storage area)
B2 - Structured Protection
*-Integrity Axiom
45. Which in the Orange Book ratings represents the highest level of trust?
B2
Totality of protection mechanisms
Bell-LaPadula Model
A Thread
46. What model use an access control triples and requires that the system maintain separation of duty ?
Absolute addresses
The "No read Up" rule
Clark-Wilson
The Thread (memory Management)
47. What prevents a process from accessing another process' data?
A Thread
Process isolation
A lattice of Intergrity Levels
Trusted Products Evaluation Program (TPEP)
48. System Architecture that separates system functionality into Hierarchical layers
Security Policy
A Layered Operating System Architecure
Division D - Minimal Protection
Security Policy - Orange Book
49. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
The rule is talking about "Reading"
Simple Security Rule
Trusted Distribution
Covert channels
50. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Its Clearance Label (Top Secret - Secret - or Confidential)
Orange Book interpretations
NOT Integrity
Logical addresses