Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. B1 is also called "Labeled Security" and each data object must have a classification label and each subject a clearance label. On each access attempt - the classification and clearance are checked to verify that the access is permissible.






2. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






3. The Orange book does NOT Cover ________________ - And Database management systems






4. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






5. The Biba model (introduced in 1977) - The Sutherland model (published in 1986) - The Brewer-Nash model (published in 1989)






6. When the RAM and secondary storage are combined the result is __________.






7. The biggest difference between System High Security Mode and Dedicated Security Mode is: ______.






8. Intended for environments that require systems to handle classified data.






9. B3 is also called "Security Domains" and imposes more granularity in each protection mechanism.






10. The object reuse concept must also be invoked - meaning that any medium holding data must not contain any remnants of information after it is released for another subject to use. All data must be efficiently erased once the subject is doen with the m






11. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






12. The Reserved hard drive space used to to extend RAM capabilites.






13. When the address location that is specified in the program instruction contains the address of the final desired location.






14. Ensuring thta information does not flow from a higher security lever to a lower level in the Bell-LaPadula Model is referred to as ___________________ - which would take place through a "write down" operation. (An actual compromise occurs if and when






15. Verification Protection






16. Contains the beginning address






17. The Indexed memory addresses that software uses






18. Another word for Primary storage and distinguishes physical memory from virtual memory.






19. The Physical memory address that the CPU uses






20. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






21. In the Bell-LaPadula Model the Subject's Label contains ___________________.






22. What does the simple integrity axiom mean in the Biba model?






23. Mandatory access control is enfored by the use of security labels.






24. Bell-LaPadula Model - ____________ : A subject at a given security level can NOT READ data that reside at a higher security level.






25. Which Orange Book evaluation level is described as "Discretionary Security Protection"?






26. What does the Clark-Wilson security model focus on






27. Happen because input data is not checked for appropriate length at time of input






28. Which is an ISO standard product evaluation criteria that supersedes several different criteria






29. The security mechanisms and the system as a whole must perform predictably and acceptably in different situations continuously.






30. The total combination of protection mechanisms within a computer system






31. Applications and user activity






32. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






33. Based on a known address with an offset value applied.






34. Ssoftware that is stored within ROM (Read-Only Memory) - (ROM is nonvolatile)






35. The reference monitor is an access control concept - Referring to ________________ that mediates all accesses to objects by subjects based on information in an access control database.






36. What model use an access control triples and requires that the system maintain separation of duty ?






37. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






38. The group that oversees the processes of evaluation within TCSEC is?






39. Execute one instruction at a time.






40. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






41. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






42. The combination of RAM - Cache and the Processor Registers






43. Based on the Bell-LaPadula Security model - and evidence of reference monitor enforcement must be available.






44. The Orange book requires protection against two_____________ - which are these Timing and Storage






45. The Security Model Incorporates the ____________ that should be enforced in the system.






46. The security kernel is the mechanism that _____________ of the reference monitor concept.






47. An organization within the National Security Agency (NSA) is responsible for Evaluating computer systems and products. The Trusted Product Evaluation program (TPEP) oversees the testing by approved entities of commercial products against a specific s






48. For rhe type of environment that processes sensitive data that require a higher degree of security. It requires systems that are relatively resistant to peneration and compromise






49. In the Orange Book - functionality and assurance are NOT _____________ as they are in the ITSEC and the Common Criteria.






50. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests