Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Logical access control mechanisms are used to enforce authentication and the uniquenes of each individual's identification.






2. TCSEC provides a means to evaluate ______________________.






3. What does the * (star) property mean in the Bell-LaPadula model?






4. What prevents a process from accessing another process' data?






5. In Access Control terms it means to be higher than or equal to. In the Bell-Lapadula Model - this is refered to as the dominance relation - which is the relationship of the subject's clearance to the object's classification

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






7. Which TCSEC level first addresses object reuse?






8. In both the Bell-LaPadula and Biba Models if the word "* or Star is used - _______________.






9. The reference monitor - in accordance with the security policy - ____________ that are made in the access control database.






10. A1 is also called "Verified Design" and requires formal verification of the design and specifications.






11. According to the Orange Book - trusted facility management is not required for which security levels?






12. Mandatory Protection






13. The Orange book requires protection against two_____________ - which are these Timing and Storage






14. A set of objects that a subject is able to access






15. The Bell-LaPadula Model is a _______________.






16. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






17. A Policy based control. All objects and systems have a sensitivity level assigned to them






18. The Biba Model - _____________: A subject cannot read data from a lower Integrity level " No Read Down"






19. All users have a clearance for and a formal need to know about - all data processed with the system.






20. What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?






21. The total combination of protection mechanisms within a computer system






22. The Biba Model - ______________: A subject cannot request service (invoke) to subjects of higher integrity






23. A ring protection system ________: User mode programs from direct access to peripherals and requires them to make use of services running at more privileged levels.






24. A is a form of EPROM - but its data storage can be erased and modified electrically by onboard programming circuitry and signals.






25. Documentation must be provided - including test - design - and specification document - user guides and manuals






26. Based on The Bell-LaPadula model - because it allows for multilevel security to be integrated into the code.






27. A portion of a process. When the thread is generated - it shares the same domain(resources) as its process.






28. This class ("Structured Protection") requires more stringent authentication mechanisms and well-defined interfaces between layers. Subjects and devices require labels and the system must not allow covert channels.






29. Mandatory Access requires that _____________ be attached to all objects.






30. Which increases the performance in a computer by overlapping the steps of different instructions?






31. The first mathematical model of a multi-level security policy used to define the concept of a secure state - the modes of access - and rules for granting access?






32. The Orange Book describes four hierarchical levels to categorize security systems. Which levels require mandatory protection?






33. In ______________ the subject must have: Need to Know for ALL the information contained within the system.






34. Mediates all access and Functions between subjects and objects.






35. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






36. The Bell-LaPadula model Subjects and Objects are ___________.






37. When the RAM and secondary storage are combined the result is __________.






38. System Architecture that separates system functionality into Hierarchical layers






39. As per FDA data should be ______________________________.






40. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






41. What does the simple integrity axiom mean in the Biba model?






42. Audit data must be captured and protected to enforce accountability






43. Contains the ending address






44. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






45. The subject must have Need to Know for ONLY the information they are trying to access.






46. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






47. The Policy must be explicit and well defined and enforced by the mechanisms within the system






48. Succesfully Evaluated products are placed on?






49. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






50. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.