Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Based on a known address with an offset value applied.






2. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






3. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system






4. The Biba Model adresses _____________________.






5. The *-Property rule is refered to as ____________.






6. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






7. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






8. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






9. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






10. The Availability - Integrity and confidentiality requirements of multitasking operating systems






11. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






12. Contains an Address of where the instruction and dara reside that need to be processed.






13. Subjects and Objects cannot change their security levels once they have been instantiated (created)






14. A set of objects that a subject is able to access






15. When the address location that is specified in the program instruction contains the address of the final desired location.






16. Which can be used as a covert channel?






17. What does the * (star) property mean in the Bell-LaPadula model?






18. What are the components of an object's sensitivity label?






19. TCSEC provides a means to evaluate ______________________.






20. Includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted.






21. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






22. When the RAM and secondary storage are combined the result is __________.






23. Access control labels must be associated properly with objects.






24. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






25. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






26. Which is an ISO standard product evaluation criteria that supersedes several different criteria






27. What prevents a process from accessing another process' data?






28. Mediates all access and Functions between subjects and objects.






29. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






30. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






31. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






32. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






33. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






34. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






35. A Policy based control. All objects and systems have a sensitivity level assigned to them






36. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






37. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






38. When a portion of primary memory is accessed by specifying the actual address of the memory location






39. The Security Model Incorporates the ____________ that should be enforced in the system.






40. Intended for environments that require systems to handle classified data.






41. The Simple Security rule is refered to as______________.






42. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






43. Operating System Kernel






44. Which TCSEC level first addresses object reuse?






45. The Policy must be explicit and well defined and enforced by the mechanisms within the system






46. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






47. The Bell-LaPadula model Subjects and Objects are ___________.






48. Each data object must contain a classification label and each subject must have a clearance label.






49. Bell-LaPadula model was proposed for enforcing access control in _____________________.






50. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests