SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)
Prohibits
Firmware
Certification
B3
2. Individual subjects must be uniquely identified.
Orange Book - D
Identification - Orange Book
All Mandatory Access Control (MAC) systems
Security Policy - Orange Book
3. When a vendor submits a product for evaluation - it submits it to the ____________.
Access Matrix model
A security kernel
The National Computer Security Center (NCSC)
Controls the checks
4. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
State machine model
Trusted facility management
C2
Fail safe
5. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.
A Base Register (Memory Management)
attributability
Swap Space
Reduced Instruction Set Computers (RISC)
6. Commonly referred to as The Big Mess Because of its lack of structure. MS-DOS is an example of a monolithic operation system
*-Integrity Axiom
The Monolithic Operation system Architecture
B2 rating
Prevent secret information from being accessed
7. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
Overt channel
Orange Book - A1
Trusted Network Interpretation (TNI)
Clark-Wilson Model
8. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
C2 - Controlled Access Protection
The Simple Security Property
Life Cycle Assurance Requirement
B3
9. Succesfully Evaluated products are placed on?
Multilevel Security Policies
The Evaluated Products List (EPL) with their corresponding rating
Access Matrix model
Physical security
10. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
The Evaluated Products List (EPL) with their corresponding rating
Controlling unauthorized downgrading of information
C2 - Controlled Access Protection
Swap Space
11. The Bell-LaPadula Model is a _______________.
TCB (Trusted Computing Base)
Real storage
Subject to Object Model
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
12. The Security Model Incorporates the ____________ that should be enforced in the system.
Division B - Mandatory Protection Architecture
Integrity
Trusted Products Evaluation Program (TPEP)
Security Policy
13. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Buffer (temporary data storage area)
Totality of protection mechanisms
Government and military applications
D
14. I/O drivers and utilities
B1
B3
Certification
Ring 2
15. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Orange Book - A1
Simple Security Rule
A Limit Register (Memory Management)
A security kernel
16. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space
The Biba Model
Be protected from modification
Swap Space
A1
17. The total combination of protection mechanisms within a computer system
B3
Accreditation
Models concerned with integrity
TCB (Trusted Computing Base)
18. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
The Strong star property rule
Isolate processes
Covert channels
Real storage
19. Discretionary access control is based on individuals and/or groups. It requires a separation of users and information and identification and authentication of individual entities
Logical addresses
Operational assurance requirements
C1 - Discretionary Security Protection
Multitasking
20. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The Thread (memory Management)
The reference monitor
Identification - Orange Book
A Base Register (Memory Management)
21. Execute one instruction at a time.
Examples of Layered Operating Systems
B1 - Labeled Security rating
Scalar processors
The security perimeter
22. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
First evaluation class
Constrained
Be protected from modification
Clark-Wilson
23. TCSEC provides a means to evaluate ______________________.
Security mechanisms and evalautes their effectivenes
Trusted Distribution
Virtual Memory
The trustworthiness of an information system
24. Subjects and Objects cannot change their security levels once they have been instantiated (created)
Pipelining
The Tranqulity principle (The Bell-LaPadula Model)
Orange Book A
The Security Kernel
25. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data
Orange Book - A1
Thrashing
The Clark Wilson integrity model
Process isolation
26. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Documentation - Orange Book
Need-to-know
Orange Book - B2
Its classification label (Top Secret - Secret or confidential)
27. Security Labels are not required until __________; thus C2 does not require security labels but B1 does
Orange Book C
Most commonly used approach
International Standard 15408
Security rating B
28. Audit data must be captured and protected to enforce accountability
Need-to-know
Accountability - Orange Book
The Trusted Computing Base (TCB)
B2 - Structured Protection
29. If an operating system permits executable objects to be used sequentially by multiple users without a refresh of the objects - what security problem is most likely to exist?
NOT Integrity
The security kernel
Disclosure of residual data
Mandatory access control
30. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
All Mandatory Access Control (MAC) systems
D
The Rule is talking about writing
Swap Space
31. In the Bell-LaPadula Model the Subject's Label contains ___________________.
C2
Direct Addressing
Multitasking
Its Clearance Label (Top Secret - Secret - or Confidential)
32. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s
Totality of protection mechanisms
Mandatory access control
Orange Book - B2
The National Computer Security Center (NCSC)
33. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.
Integrity
The "No write Down" Rule
Division D - Minimal Protection
TCB (Trusted Computing Base)
34. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Certification
The Strong star property rule
B2
Files - directories and devices
35. The Orange book requires protection against two_____________ - which are these Timing and Storage
Erasable and Programmable Read-Only Memory (EPROM)
D
Types of covert channels
B3 - Security Domains
36. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?
The rule is talking about "Reading"
Basic Security Theorem (used in computer science) definition
B3
The Clark Wilson integrity model
37. Mandatory access control is enfored by the use of security labels.
Scalar processors
A Layered Operating System Architecure
Ring 0
Division B - Mandatory Protection
38. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.
Types of covert channels
'Dominate'
The Clark Wilson integrity model
Continuous protection - O/B
39. The security kernel is the mechanism that _____________ of the reference monitor concept.
Be protected from modification
Virtual Memory
Enforces the rules
*-Integrity Axiom
40. Which TCSEC level first addresses object reuse?
Security Policy is clearly defined and documented
Ring 1
Disclosure of residual data
C2
41. Applications and user activity
Constrained
The Evaluated Products List (EPL) with their corresponding rating
Ring 3
Thrashing
42. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
C1 - Discretionary Security Protection
Enforces the rules
Direct Addressing
C2
43. Which in the Orange Book ratings represents the highest level of trust?
B3
The Red Book
B2
A lattice of Intergrity Levels
44. Mediates all access and Functions between subjects and objects.
Orange Book - B3
Clark-Wilson
The *-Property rule (Star property)
The Security Kernel
45. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
The "No write Down" Rule
Constrained
NOT Integrity
B2
46. Each data object must contain a classification label and each subject must have a clearance label.
Orange Book ratings
Virtual Memory
Bell-LaPadula Model
B1 - Labeled Security
47. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
A and B
Physical security
Stored in Reak Memory
Life Cycle Assurance Requirement
48. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Virtual storage
Orange Book interpretations
Implement software or systems in a production environment
Ring 2
49. All users have a clearance for and a formal need to know about - all data processed with the system.
Orange Book B
Integrity
Totality of protection mechanisms
Dedicated Security Mode
50. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.
Compare the security labels
Higher or equal to access class
Identification - Orange Book
Covert channels
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests