Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating System Kernel






2. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






3. The total(sum)combination of protection mechanisms within a computer system. The TCB includes hardware - software - and firmware.






4. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






5. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






6. Which is an ISO standard product evaluation criteria that supersedes several different criteria






7. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. The Indexed memory addresses that software uses






9. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






10. Individual subjects must be uniquely identified.






11. What does the * (star) property mean in the Bell-LaPadula model?






12. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection






13. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






14. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






15. When the contents of the address defined in the program's instruction is added to that of an index register.






16. Trusted facility management is an assurance requirement only for ________________.






17. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






18. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






19. Which uses Protection Profiles and Security Targets?






20. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






21. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






22. What does the simple integrity axiom mean in the Biba model?






23. A system uses the Reference Monitor to ___________________ of a subject and an object?






24. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






25. Which can be used as a covert channel?






26. The C2 evaluation class of the _________________ offers controlled access protection.






27. Accreditation is the authorization by management to _____________________. This authorization may be either provisional or full.






28. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






29. The subject must have Need to Know for ONLY the information they are trying to access.






30. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






31. Contains an Address of where the instruction and dara reside that need to be processed.






32. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






33. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






34. System Architecture that separates system functionality into Hierarchical layers






35. The Availability - Integrity and confidentiality requirements of multitasking operating systems






36. Documentation must be provided - including test - design - and specification document - user guides and manuals






37. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






38. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






39. The total combination of protection mechanisms within a computer system






40. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






41. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






42. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






43. The Simple Security rule is refered to as______________.






44. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






45. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






46. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






47. The Security Kernel is the Core of The TCB and is the _____________ to building trusted computing systems.






48. The Biba Model adresses _____________________.






49. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






50. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise