SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Orange Book - B3
Constrained
Orange Book - A1
Security Policy is clearly defined and documented
2. A process that resides in a privileged domain to be able to execute its instructions and process its data with the assurance that programs in a different domain can NOT negatively affect its environment.
Ring 3
Execution Domain
C2 - Controlled Access Protection
Secondary Storage
3. A domain of trust that shares a single security policy and single management
Enforces the rules
Buffer overflows
Division B - Mandatory Protection
A security domain
4. A type of memory used for High-speed writing and reading activities.
Clark-Wilson
Dominate the object's sensitivity label
Cache Memory
The TCSEC - Aka Orange Book
5. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.
Prohibits
The "No write Down" Rule
Multilevel Security Policies
B3 - Security Domains
6. Applications and user activity
Ring 3
The Security Kernel
A Base Register (Memory Management)
Orange Book A
7. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
C1 - Discrection Security Protection is a type of environment
Security Policy is clearly defined and documented
The Biba Model
All Mandatory Access Control (MAC) systems
8. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.
Enforces the rules
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
Models concerned with integrity
In C2 - Controlled Access Protection environment
9. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
Indirect addressing
Direct addressing
Buffer (temporary data storage area)
Files - directories and devices
10. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Division C - Discretionary Protection
The security kernel
The Simple Security Property
Networks and Communications
11. Mandatory access control is enfored by the use of security labels.
Reduced Instruction Set Computers (RISC)
B1 - Labeled Security rating
Division B - Mandatory Protection
In C2 - Controlled Access Protection environment
12. Mediates all access and Functions between subjects and objects.
Life Cycle Assurance Requirement
Overt channel
The Security Kernel
State machine model
13. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
C2
The rule is talking about "Reading"
Execution Domain
Stored in Reak Memory
14. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
An abstract machine
Orange Book - B3
Types of covert channels
Models concerned with integrity
15. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use
B3
No read down
Programmable Read-Only Memory (PROM)
Examples of Layered Operating Systems
16. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
The Strong star property rule
Life-cycle assurance - O/B
Multilevel Security Policies
Secondary Storage
17. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked
Orange Book - B1
The reference monitor
Dedicated Security Mode
Access Matrix model
18. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Dedicated Security Mode
Its Clearance Label (Top Secret - Secret - or Confidential)
Controlling unauthorized downgrading of information
Continuous protection - O/B
19. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.
Models concerned with integrity
Operational assurance requirements
Disclosure of residual data
The "No write Down" Rule
20. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?
Dedicated Security Mode
No read down
B3
Virtual storage
21. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.
Attributable - original - accurate - contemporaneous and legible
Simple Security Rule
The Red Book
State machine model
22. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.
Virtual Memory
Life Cycle Assurance Requirement
C1
The *-Property rule (Star property)
23. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.
Security mechanisms and evalautes their effectivenes
Process isolation
C2
The Simple Security Property
24. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Operational assurance requirements
Orange Book interpretations
security protection mechanisms
Security Policy - Orange Book
25. In B2 Distinct address spaces must be provided to _________ - and a covert channel analysis is conducted. B2 adds assurance by adding requirements to the design of the system
Trusted Products Evaluation Program (TPEP)
The Biba Model
Buffer (temporary data storage area)
Isolate processes
26. In the Bell-LaPadula Model the Object's Label contains ___________________.
A single classification and a Compartment Set
Its classification label (Top Secret - Secret or confidential)
B3 - Security Domains
The "No write Down" Rule
27. TCSEC addresses Confidentiality - but _____________ . The TCSEC focuses mainly on one attribute of Security Confidentiality.
Protection Rings Support
Orange Book - B2
Orange Book interpretations
NOT Integrity
28. Contains the beginning address
The Evaluated Products List (EPL) with their corresponding rating
A Base Register (Memory Management)
Clark-Wilson
B2 - Structured Protection
29. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.
Division B - Mandatory Protection Architecture
Firmware
The security perimeter
Fail safe
30. Audit data must be captured and protected to enforce accountability
Accountability - Orange Book
Life Cycle Assurance Requirement
Trusted Network Interpretation (TNI)
Trusted Products Evaluation Program (TPEP)
31. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
No read up
No read down
Enforces the rules
C2 - Controlled Access Protection
32. Used by Windows systems to reserve the "Swap Space"
Access Matrix model
Most commonly used approach
The Common Criteria
Pagefile.sys file
33. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.
Overt channel
Most commonly used approach
An abstract machine
A Base Register (Memory Management)
34. Which is an ISO standard product evaluation criteria that supersedes several different criteria
The *-Property rule (Star property)
Buffer overflows
B3
The Common Criteria
35. The process of Evaluating the security stance of the software or system against a selected set of standards or policies. This may precede accreditation but is not a required precursor.
Certification
Ring 2
Stored in Reak Memory
System High Security Mode
36. Mandatory Protection
A1
Orange Book - B1
C2
Orange Book B
37. The type of environment that would require A1 systems is the most secure of secure environments. It deals with top-secret information and cannot adequately trust anyone using the systems without strict authentication - restrictions and auditing.
Security rating B
A1 - Rating
Programmable Read-Only Memory (PROM)
Orange Book - B2
38. System Architecture that separates system functionality into Hierarchical layers
A Layered Operating System Architecure
Life-cycle assurance - O/B
Access control to the objects by the subjects
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
39. Happen because input data is not checked for appropriate length at time of input
Evaluated separately
Buffer overflows
All Mandatory Access Control (MAC) systems
Attributable data
40. When the address location that is specified in the program instruction contains the address of the final desired location.
Multitasking
Certification
Indirect addressing
NOT Integrity
41. What prevents a process from accessing another process' data?
Clark-Wilson Model
The Strong star property rule
Process isolation
A security domain
42. The Orange book requires protection against two_____________ - which are these Timing and Storage
Types of covert channels
Most commonly used approach
Dominate the object's sensitivity label
The Clark Wilson integrity model
43. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?
Continuous protection - O/B
B3
Prevent secret information from being accessed
A and B
44. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)
C2 - Controlled Access Protection
Controls the checks
Prevent secret information from being accessed
First evaluation class
45. Bell-LaPadula model was proposed for enforcing access control in _____________________.
Totality of protection mechanisms
Types of covert channels
Government and military applications
Evaluated separately
46. Which increases the performance in a computer by overlapping the steps of different instructions?
The security perimeter
Complex Instruction Set Computers (CISC)
Orange Book C
Pipelining
47. Another word for Primary storage and distinguishes physical memory from virtual memory.
Security Policy
The National Computer Security Center (NCSC)
Continuous protection - O/B
Real storage
48. Contains the ending address
Reduced Instruction Set Computers (RISC)
Prevent secret information from being accessed
A Limit Register (Memory Management)
Evaluated separately
49. Which addresses a portion of the primary memory by specifying the actual address of the memory location?
C2 - Controlled Access Protection
Division B - Mandatory Protection Architecture
Direct Addressing
The "No write Down" Rule
50. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
Be protected from modification
An abstract machine
B3 - Rating
Simple Integrity Axiom
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests