SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Constrained
Covert channels
Security mechanisms and evalautes their effectivenes
The Clark Wilson integrity model
2. Which increases the performance in a computer by overlapping the steps of different instructions?
A lattice of Intergrity Levels
security protection mechanisms
Pipelining
Orange Book interpretations
3. In the Bell-LaPadula Model the Object's Label contains ___________________.
Accreditation
C1
Its classification label (Top Secret - Secret or confidential)
Simple Security Rule
4. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
The Clark Wilson integrity model
Stored in Reak Memory
The Red Book
Controlling unauthorized downgrading of information
5. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
Indirect addressing
Orange Book C
Prevent secret information from being accessed
B3
6. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.
Storage and timing
Pipelining
Security Policy
Orange Book - B2
7. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
Models concerned with integrity
NOT Integrity
Constrained
Dominate the object's sensitivity label
8. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.
The Trusted Computing Base (TCB)
Logical addresses
Mandatory access control
Indirect addressing
9. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Mandatory access control
Trusted hardware - Software and Firmware
In C2 - Controlled Access Protection environment
Pagefile.sys file
10. Can be erased - modified and upgraded.
System High Security Mode
Erasable and Programmable Read-Only Memory (EPROM)
Security rating B
Be protected from modification
11. Based on a known address with an offset value applied.
Multilevel Security Policies
Relative Addresses
Integrity
Life-cycle assurance - O/B
12. Contains an Address of where the instruction and dara reside that need to be processed.
The Thread (memory Management)
Fail safe
Be protected from modification
Its classification label (Top Secret - Secret or confidential)
13. The Bell-LaPadula Model is a _______________.
B3 - Security Domains
Subject to Object Model
The Biba Model
All Mandatory Access Control (MAC) systems
14. Access control labels must be associated properly with objects.
Relative Addresses
A Limit Register (Memory Management)
Labels - Orange Book
Orange Book ratings
15. Execute one instruction at a time.
The *-Property rule (Star property)
Scalar processors
Certification
Networks and Communications
16. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
B2 rating
Prevent secret information from being accessed
Constrained
Indexed addressing
17. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
The Integrity of data within applications
Reduced Instruction Set Computers (RISC)
Orange Book C
Security rating B
18. The security kernel is the mechanism that _____________ of the reference monitor concept.
Enforces the rules
State machine model
Highly secure systems (B2 - B3 and A1)
Models concerned with integrity
19. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
The "No read Up" rule
Overt channel
Labels - Orange Book
In C2 - Controlled Access Protection environment
20. Involves sharing the processor amoung all ready processes
Multitasking
Prohibits
Ring 0
The "No write Down" Rule
21. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
The security perimeter
Basic Security Theorem (used in computer science) definition
Types of covert channels
The Evaluated Products List (EPL) with their corresponding rating
22. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Attributable data
Need-to-know
Ring 2
D
23. Which is an ISO standard product evaluation criteria that supersedes several different criteria
C2 - Controlled Access Protection
The Common Criteria
Storage and timing
Life-cycle assurance - O/B
24. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The Strong star property rule
The reference monitor
The Simple Security Property
Enforces the rules
25. As per FDA data should be ______________________________.
Attributable - original - accurate - contemporaneous and legible
C1
Trusted facility management
Access Matrix model
26. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Totality of protection mechanisms
The National Computer Security Center (NCSC)
Division D - Minimal Protection
C1 - Discrection Security Protection is a type of environment
27. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Division C - Discretionary Protection
Orange Book B
Life Cycle Assurance Requirement
Discretionary Security Property (ds-property)
28. Requires more stringent authentication mechanisms and well-defined interfaces among layers.
Relative Addresses
B2 - Structured Protection
Its Clearance Label (Top Secret - Secret - or Confidential)
Highly secure systems (B2 - B3 and A1)
29. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Division B - Mandatory Protection Architecture
Orange Book A
Multilevel Security Policies
Identification - Orange Book
30. A set of objects that a subject is able to access
A Domain
Swap Space
The Thread (memory Management)
Life-cycle assurance - O/B
31. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Operational assurance requirements
The trustworthiness of an information system
Highly secure systems (B2 - B3 and A1)
The Strong star property rule
32. Happen because input data is not checked for appropriate length at time of input
Buffer overflows
Pagefile.sys file
Swap Space
A1
33. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.
Implement software or systems in a production environment
C2 - Controlled Access Protection
Orange Book C
Stored in Reak Memory
34. Which describe a condition when RAM and Secondary storage are used together?
C2 - Controlled Access Protection
Erasable and Programmable Read-Only Memory (EPROM)
Operational assurance requirements
Virtual storage
35. Discretionary protection
Orange Book C
Highly secure systems (B2 - B3 and A1)
A Base Register (Memory Management)
Simple Security Rule
36. The Reserved hard drive space used to to extend RAM capabilites.
Implement software or systems in a production environment
Swap Space
Discretionary Security Property (ds-property)
Orange Book - B3
37. Minimal Security
C2
Relative Addresses
Discretionary Security Property (ds-property)
Orange Book - D
38. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
B1
Continuous protection - O/B
Life-cycle assurance - O/B
Examples of Layered Operating Systems
39. Succesfully Evaluated products are placed on?
Clark-Wilson
C2 - Controlled Access Protection
The Simple Security Property
The Evaluated Products List (EPL) with their corresponding rating
40. Users need to be Identified individually to provide more precise acces control and auditing functionality.
Dedicated Security Mode
Ring 3
Orange Book A
C2 - Controlled Access Protection
41. The assignment of a specific individual to administer the security-related functions of a system.
Examples of Layered Operating Systems
Trusted facility management
Firmware
C2
42. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
C2 - Controlled Access Protection
The Common Criteria
First evaluation class
*-Integrity Axiom
43. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
All Mandatory Access Control (MAC) systems
First evaluation class
The security kernel
Security mechanisms and evalautes their effectivenes
44. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
Trusted Network Interpretation (TNI)
B3 - Security Domains
In C2 - Controlled Access Protection environment
The National Computer Security Center (NCSC)
45. The Physical memory address that the CPU uses
Absolute addresses
Orange Book - A1
The "No read Up" rule
Primary storage
46. Data in Cache can be accessed much more quickly than Data
Stored in Reak Memory
Its Clearance Label (Top Secret - Secret - or Confidential)
Accountability - Orange Book
Disclosure of residual data
47. The Simple Security rule is refered to as______________.
The "No read Up" rule
Bell-LaPadula Model
Direct Addressing
Compare the security labels
48. Mediates all access and Functions between subjects and objects.
Orange Book C
The Red Book
Orange Book - A1
The Security Kernel
49. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
The Monolithic Operation system Architecture
B3
Dedicated Security Mode
C1 - Discrection Security Protection is a type of environment
50. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Dedicated Security Mode
Division C - Discretionary Protection
Orange Book A
Physical security