Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






2. Using TPs (Transformation Procedures) to modify CDIs (Constrained Data) items is refered to as Well-Formed transaction






3. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






4. An abstract machine which must mediate all access to subjects to objects - be protected from modification - be verifiable as correct - and is always invoked






5. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






6. Buffer overflows occurs when a program or process tries to store more data in a _____________ than it was intended to hold.






7. Which evaluation class of the Trusted Network Interpretation (TNI) offers security domains?






8. What is defined as the hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept?






9. Users are trusted but a certain level of accountability is required. C2 over is seen as the most reasonable class for commmercial applications - but the level of protection is still relatively weak.






10. The Simple Security rule is refered to as______________.






11. The Bell-LaPadula model Subjects and Objects are ___________.






12. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






13. According to the Orange Book - which security level is the first to require a system to protect against covert timing channels?






14. Mandatory Protection






15. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






16. An imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?






17. When a vendor submits a product for evaluation - it submits it to the ____________.






18. The hardware - firmware and software elements of a trusted computing base that implement the reference monitor concept.






19. The TCB is the ________________ within a computer system that work together to enforce a security policy.






20. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






21. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






22. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






23. A subject at a given clearance may not read an object at a higher classification






24. The security kernel is the mechanism that _____________ of the reference monitor concept.






25. TCB contains The Security Kernel and all ______________.






26. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






27. A type of memory used for High-speed writing and reading activities.






28. What does the simple security (ss) property mean in the Bell-LaPadula model?






29. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






30. When a portion of primary memory is accessed by specifying the actual address of the memory location






31. The Biba Model is not concerned with security levels and confidentiality. It uses _________________.






32. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






33. Involves sharing the processor amoung all ready processes






34. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






35. The Orange book requires protection against two_____________ - which are these Timing and Storage






36. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






37. According to the Orange Book - trusted facility management is not required for which security levels?






38. Which TCSEC level first addresses object reuse?






39. The reference monitor must mediate all access - _____________ - be verifiable as correct - and must always be invoked.






40. Which can be used as a covert channel?






41. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






42. The Biba Model - ______________: A Subject cannot write data to an object at a higher integrity level (No write Up)






43. In B2 Subjects and devices requre labels and the system must NOT allow ________. No Trapdoors exists.






44. Security Labels are not required until __________; thus C2 does not require security labels but B1 does






45. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






46. Access control labels must be associated properly with objects.






47. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






48. Bell-LaPadula - ______________: This rule is based on named subjects and objects. It specifies that specific permissions allow a subject to pass on permissions to pass on permissions at its own discretion. These permissions are stored in an access ma






49. The omission of networks and network components in the TCSEC was recognized and addressed in the "Trusted Network Interpretation of the TCSEC" otherwise known as ___________.






50. Which describe a condition when RAM and Secondary storage are used together?