Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






2. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






3. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






4. Which uses Protection Profiles and Security Targets?






5. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.






6. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






7. TCSEC provides a means to evaluate ______________________.






8. What is called the formal acceptance of the adequacy of a system's overall security by management?






9. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.






10. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






11. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.






12. System Architecture that separates system functionality into Hierarchical layers






13. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






14. Which integrity model defines a constrained data item - an integrity verification procedure and a transformation procedure?






15. What prevents a process from accessing another process' data?






16. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






17. Subjects and Objects cannot change their security levels once they have been instantiated (created)






18. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






19. Which is a straightforward approach that provides access rights to subjects for objects?






20. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






21. Can be erased - modified and upgraded.






22. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






23. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






24. Which addresses a portion of the primary memory by specifying the actual address of the memory location?






25. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






26. What are the components of an object's sensitivity label?






27. A domain of trust that shares a single security policy and single management






28. The *-Property rule is refered to as ____________.






29. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






30. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






31. When the address location that is specified in the program instruction contains the address of the final desired location.






32. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






33. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






34. Simpler instructions that require fewer clock cycles to execute.






35. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.


36. Audit data must be captured and protected to enforce accountability






37. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






38. Permits a database to have two records that are identical except for Their classifications






39. Components considered as part of the Trusted Computing Base (from the Orange Book) are?






40. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






41. In B1 the security policy is based on Informal statement and the design specifications are reviewed and verified where as in B2 the ___________________ - and the system design and implementation are subject to more thorough review and testing procedu






42. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use






43. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






44. Individual subjects must be uniquely identified.






45. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






46. When a computer uses more than one CPU in parallel to execute instructions is known as?






47. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






48. According to the Orange Book - trusted facility management is not required for which security levels?






49. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






50. Mandatory Access requires that _____________ be attached to all objects.