SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
Simple Security Rule
Swap Space
Most commonly used approach
Identification - Orange Book
2. Data in Cache can be accessed much more quickly than Data
Stored in Reak Memory
The "No read Up" rule
International Standard 15408
Models concerned with integrity
3. The Simple Security rule is refered to as______________.
The Monolithic Operation system Architecture
The "No read Up" rule
Virtual Memory
Dedicated Security Mode
4. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Operational assurance requirements
Controlling unauthorized downgrading of information
Division B - Mandatory Protection
'Dominate'
5. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.
B1 - Labeled Security
Clark-Wilson
Indexed addressing
State machine model
6. In access control terms - the word "dominate" refers to ___________.
Higher or equal to access class
No read down
Absolute addresses
Scalar processors
7. Used by Windows systems to reserve the "Swap Space"
security protection mechanisms
Pagefile.sys file
The Biba Model
Protection Rings Support
8. Mandatory Protection
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
The National Computer Security Center (NCSC)
Orange Book B
Labels - Orange Book
9. The TCB is the ________________ within a computer system that work together to enforce a security policy.
The Common Criteria
Totality of protection mechanisms
C2
C1 - Discrection Security Protection is a type of environment
10. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.
Secondary Storage
Orange Book ratings
Trusted Distribution
Mandatory access control
11. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
C2
Compare the security labels
A1
Administrative declaration
12. Which would be designated as objects on a MAC system?
Buffer overflows
Files - directories and devices
A security domain
Evaluated separately
13. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.
Ring 3
The "No write Down" Rule
Orange Book - B1
A single classification and a Compartment Set
14. Another word for Primary storage and distinguishes physical memory from virtual memory.
Real storage
A Limit Register (Memory Management)
Access Matrix model
The "No write Down" Rule
15. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.
Process isolation
Physical security
security protection mechanisms
A security domain
16. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
C2 - Controlled Access Protection
Division D - Minimal Protection
Simple Security Rule
Multilevel Security Policies
17. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?
B1 - Labeled Security
Ring 1
The security perimeter
First evaluation class
18. The Indexed memory addresses that software uses
Scalar processors
Logical addresses
Cache Memory
A security domain
19. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
Multilevel Security Policies
Covert channels
The security kernel
Prevent secret information from being accessed
20. What model use an access control triples and requires that the system maintain separation of duty ?
Clark-Wilson
Multiprocessing
Virtual storage
Fail safe
21. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Trusted hardware - Software and Firmware
Its Clearance Label (Top Secret - Secret - or Confidential)
Security Policy
C1 - Discrection Security Protection is a type of environment
22. Which increases the performance in a computer by overlapping the steps of different instructions?
Polyinstantiation
Division B - Mandatory Protection Architecture
Direct Addressing
Pipelining
23. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards
Physical security
Administrative declaration
D
Prevent secret information from being accessed
24. Trusted facility management is an assurance requirement only for ________________.
Controlling unauthorized downgrading of information
Virtual storage
Networks and Communications
Highly secure systems (B2 - B3 and A1)
25. Which in the Orange Book ratings represents the highest level of trust?
B2
Mandatory Access Control (MAC)
C1 - Discretionary Security Protection
A single classification and a Compartment Set
26. Each data object must contain a classification label and each subject must have a clearance label.
All Mandatory Access Control (MAC) systems
The Strong star property rule
Orange Book C
B1 - Labeled Security
27. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.
Enforces the rules
Overt channel
The Clark Wilson integrity model
In C2 - Controlled Access Protection environment
28. The Security Model Incorporates the ____________ that should be enforced in the system.
In C2 - Controlled Access Protection environment
Attributable - original - accurate - contemporaneous and legible
All Mandatory Access Control (MAC) systems
Security Policy
29. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
The reference monitor
Mandatory access control
The security perimeter
The Simple Security Property
30. The centerpiece of the DoD Rainbow Series publications.Developed by the National Computer Security Center (NCSC)?
Sensitivity labels
The TCSEC - Aka Orange Book
Attributable data
Security Policy is clearly defined and documented
31. Based on a known address with an offset value applied.
C1 - Discretionary Security Protection
Relative Addresses
The security perimeter
Higher or equal to access class
32. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)
C1 - Discrection Security Protection is a type of environment
Controls the checks
Overt channel
Models concerned with integrity
33. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.
Programmable Read-Only Memory (PROM)
The reference monitor
Reduced Instruction Set Computers (RISC)
The Evaluated Products List (EPL) with their corresponding rating
34. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
security protection mechanisms
B1 - Labeled Security
Its Clearance Label (Top Secret - Secret - or Confidential)
Certification
35. The Orange book does NOT Cover ________________ - And Database management systems
The Evaluated Products List (EPL) with their corresponding rating
Division B - Mandatory Protection Architecture
Polyinstantiation
Networks and Communications
36. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
Its Clearance Label (Top Secret - Secret - or Confidential)
A security kernel
Direct Addressing
All Mandatory Access Control (MAC) systems
37. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.
A1 - Rating
The Biba Model
attributability
B1
38. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
Buffer overflows
B2 rating
The security kernel
Most commonly used approach
39. The *-Property rule is refered to as ____________.
The "No write Down" Rule
'Dominate'
The reference monitor
The security perimeter
40. Components considered as part of the Trusted Computing Base (from the Orange Book) are?
Orange Book - B3
Orange Book A
Subject to Object Model
Trusted hardware - Software and Firmware
41. B1 is the ___________________ of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection.
Division B - Mandatory Protection
Buffer (temporary data storage area)
The "No write Down" Rule
First evaluation class
42. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Constrained
Government and military applications
Totality of protection mechanisms
C1 - Discretionary Security Protection
43. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Its classification label (Top Secret - Secret or confidential)
Process isolation
Multilevel Security Policies
attributability
44. Which describe a condition when RAM and Secondary storage are used together?
Division B - Mandatory Protection Architecture
Multitasking
The reference monitor
Virtual storage
45. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Life-cycle assurance - O/B
C2
Be protected from modification
Orange Book B
46. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma
Orange Book - B1
Discretionary Security Property (ds-property)
The Strong star property rule
A Thread
47. The group that oversees the processes of evaluation within TCSEC is?
B1
The Clark Wilson integrity model
The security perimeter
Trusted Products Evaluation Program (TPEP)
48. n this class more granularity is provided in each protection mechanism - and the programming code that is not necessary to support the security policy is excluded.
Overt channel
Logical addresses
B3 - Security Domains
Dedicated Security Mode
49. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Trusted Products Evaluation Program (TPEP)
Fail safe
Orange Book - B2
Prohibits
50. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
Its classification label (Top Secret - Secret or confidential)
Orange Book A
Orange Book - B1
Orange Book - A1
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests