SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Security Architecture And Design
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.
First evaluation class
Fail safe
The rule is talking about "Reading"
Simple Security Rule
2. TCSEC provides a means to evaluate ______________________.
The Monolithic Operation system Architecture
A Limit Register (Memory Management)
The trustworthiness of an information system
Division B - Mandatory Protection Architecture
3. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when
C2
B3
Controlling unauthorized downgrading of information
Division B - Mandatory Protection Architecture
4. Based on a known address with an offset value applied.
B1
The Red Book
Relative Addresses
D
5. Mediates all access and Functions between subjects and objects.
The Security Kernel
Trusted facility management
Scalar processors
No write down
6. When the RAM and secondary storage are combined the result is __________.
The security kernel
Fail safe
Virtual Memory
The National Computer Security Center (NCSC)
7. Which Orange Book evaluation level is described as "Controlled Access Protection"? - This class requires a more granular method of providing access control. The system must enforce strict logon procedures and provide decision-making capabilites when
The security kernel
A security kernel
Covert channels
C2
8. What does the simple security (ss) property mean in the Bell-LaPadula model?
Attributable - original - accurate - contemporaneous and legible
No read up
Pagefile.sys file
Totality of protection mechanisms
9. Which describe a condition when RAM and Secondary storage are used together?
C1 - Discretionary Security Protection
A and B
The Simple Security Property
Virtual storage
10. In the Bell-LaPadula Model the Subject's Label contains ___________________.
Orange Book - B1
Its Clearance Label (Top Secret - Secret - or Confidential)
All Mandatory Access Control (MAC) systems
The Biba Model
11. Used by Windows systems to reserve the "Swap Space"
Pagefile.sys file
Indexed addressing
Certification
Multiprocessing
12. Has two individual assurace ratings. C1 and C2. The Higher the number of assurance rating the greater the protection
Multitasking
Relative Addresses
Dedicated Security Mode
Division C - Discretionary Protection
13. A type of memory used for High-speed writing and reading activities.
Cache Memory
A1 - Rating
Secondary Storage
Primary storage
14. Bell-LaPadula Model - ______________: A subject that has read and write capabilities can only perform those functions at the same security level - nothing higher and nothing lower.
Storage and timing
The Strong star property rule
Compare the security labels
Access Matrix model
15. The Policy must be explicit and well defined and enforced by the mechanisms within the system
Prohibits
Security Policy - Orange Book
Ring 3
Security mechanisms and evalautes their effectivenes
16. When a computer uses more than one CPU in parallel to execute instructions is known as?
Mandatory Access Control (MAC)
Multiprocessing
A Thread
State machine model
17. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.
The Biba Model
Identification - Orange Book
Sensitivity labels
B3 - Rating
18. A domain of trust that shares a single security policy and single management
Controls the checks
A security domain
Basic Security Theorem (used in computer science) definition
Buffer overflows
19. Contains the beginning address
Life Cycle Assurance Requirement
TCB (Trusted Computing Base)
A Base Register (Memory Management)
First evaluation class
20. Simpler instructions that require fewer clock cycles to execute.
B3
Controlling unauthorized downgrading of information
Reduced Instruction Set Computers (RISC)
Division B - Mandatory Protection
21. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.
Basic Security Theorem (used in computer science) definition
The security kernel
Accountability - Orange Book
Mandatory Access Control (MAC)
22. TCB contains The Security Kernel and all ______________.
Orange Book interpretations
security protection mechanisms
Ring 1
A Thread
23. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.
Life-cycle assurance - O/B
Prohibits
Indirect addressing
C2 - Controlled Access Protection
24. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.
Certification
Trusted Network Interpretation (TNI)
Orange Book - B1
Continuous protection - O/B
25. Which increases the performance in a computer by overlapping the steps of different instructions?
Pipelining
The Common Criteria
Storage and timing
Attributable data
26. What access control technique is also known as multilevel security?
The Tranqulity principle (The Bell-LaPadula Model)
Mandatory access control
An abstract machine
Electrically Erasable and Programmable Read-Only Memory (EEPROM)
27. A1 is also called "Verified Design" and requires formal verification of the design and specifications.
The TCSEC - Aka Orange Book
Orange Book - D
Orange Book - A1
The Tranqulity principle (The Bell-LaPadula Model)
28. The Red Book aka Trusted Network Interpretation (TNI) - provides _________________ for Trusted computer and communications network systems under the areas of assurance requirements
Orange Book interpretations
Trusted Products Evaluation Program (TPEP)
Division B - Mandatory Protection
The Rule is talking about writing
29. The Bell-LaPadula model Subjects and Objects are ___________.
Integrity
C2 - Controlled Access Protection
Assigned labels
Orange Book C
30. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.
International Standard 15408
Buffer (temporary data storage area)
The Monolithic Operation system Architecture
The Red Book
31. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.
All Mandatory Access Control (MAC) systems
Be protected from modification
Identification - Orange Book
Clark-Wilson Model
32. All users have a clearance for and a formal need to know about - all data processed with the system.
The "No write Down" Rule
Dedicated Security Mode
Be protected from modification
C2
33. Which uses Protection Profiles and Security Targets?
International Standard 15408
Most commonly used approach
Life Cycle Assurance Requirement
Buffer overflows
34. Which Orange Book evaluation level is described as "Verified Design"?
A1
Secondary Storage
C2 - Controlled Access Protection
Ring 0
35. When the address location that is specified in the program instruction contains the address of the final desired location.
Indirect addressing
Accreditation
Administrative declaration
Discretionary Security Property (ds-property)
36. The Bell-LaPadula Model is a _______________.
B1 - Labeled Security
security protection mechanisms
C2
Subject to Object Model
37. For a subject to have read access to an object in a Multi-Level Security Policy - it is necessary that the subject's sensitivity label must ____________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. The Reserved hard drive space used to to extend RAM capabilites.
Swap Space
The National Computer Security Center (NCSC)
Its Clearance Label (Top Secret - Secret - or Confidential)
A Base Register (Memory Management)
39. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.
Overt channel
Real storage
security protection mechanisms
Multilevel Security Policies
40. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?
B2 - Structured Protection
Fail safe
Division B - Mandatory Protection Architecture
The National Computer Security Center (NCSC)
41. Happen because input data is not checked for appropriate length at time of input
Life-cycle assurance - O/B
Erasable and Programmable Read-Only Memory (EPROM)
Buffer overflows
C1 - Discretionary Security Protection
42. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.
Orange Book - B3
No write down
Attributable data
Examples of Layered Operating Systems
43. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.
Multiprocessing
Need-to-know
The Security Kernel
First evaluation class
44. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?
A security kernel
Stored in Reak Memory
System High Security Mode
Enforces the rules
45. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise
B2 rating
B1 - Labeled Security rating
A security kernel
Operational assurance requirements
46. A subject at a given clearance may not read an object at a higher classification
Its Clearance Label (Top Secret - Secret - or Confidential)
The Simple Security Property
Accountability - Orange Book
Prohibits
47. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.
All Mandatory Access Control (MAC) systems
B3 - Security Domains
Most commonly used approach
Programmable Read-Only Memory (PROM)
48. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain
Constrained
The Rule is talking about writing
The Simple Security Property
Mandatory access control
49. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.
Logical addresses
Process isolation
C1
C2 - Controlled Access Protection
50. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.
Higher or equal to access class
B3
B3
A Thread