Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






2. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






3. Which describe a condition when RAM and Secondary storage are used together?






4. Intended for environments that require systems to handle classified data.






5. A domain of trust that shares a single security policy and single management






6. Which can be used as a covert channel?






7. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






8. The subject must have Need to Know for ONLY the information they are trying to access.






9. Execute one instruction at a time.






10. The Policy must be explicit and well defined and enforced by the mechanisms within the system






11. Which in the Orange Book ratings represents the highest level of trust?






12. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






13. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






14. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






15. The Security Model Incorporates the ____________ that should be enforced in the system.






16. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






17. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






18. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






19. The Bell-LaPadula Model is a _______________.






20. A subject at a given clearance may not read an object at a higher classification






21. The combination of RAM - Cache and the Processor Registers






22. What model use an access control triples and requires that the system maintain separation of duty ?






23. What access control technique is also known as multilevel security?






24. Permits a database to have two records that are identical except for Their classifications






25. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements






26. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






27. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






28. What does the simple integrity axiom mean in the Biba model?






29. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






30. The Physical memory address that the CPU uses






31. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






32. The Orange book requires protection against two_____________ - which are these Timing and Storage






33. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






34. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






35. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






36. Which computer design approaches is based on the fact that in earlier technologies - the instruction fetch was the longest part of the cycle






37. Which would be designated as objects on a MAC system?






38. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






39. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






40. Each data object must contain a classification label and each subject must have a clearance label.






41. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






42. Succesfully Evaluated products are placed on?






43. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






44. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






45. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






46. When the address location that is specified in the program instruction contains the address of the final desired location.






47. What are the components of an object's sensitivity label?






48. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






50. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.