Test your basic knowledge |

CISSP Security Architecture And Design

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Configuration management is also defined in the Orange Book BUT As a _____________________ and NOT an operational assurance requirement.






2. What does the simple security (ss) property mean in the Bell-LaPadula model?






3. TCB contains The Security Kernel and all ______________.






4. To ensure that the Trusted Computing Base is not tampered with during shipment or installation.






5. A form of ROM(Read-Only Memory) that can be modified after it has been manufactured. It can only be programmed only one time.






6. Each data object must contain a classification label and each subject must have a clearance label.






7. There is only only one class in Division D. Reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions.






8. Verification Protection






9. The *-Property rule is refered to as ____________.






10. Which in the Orange Book ratings represents the highest level of trust?






11. What are the components of an object's sensitivity label?






12. What is called the formal acceptance of the adequacy of a system's overall security by management?






13. A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?






14. A logical form of separation used by secure computing systems - Processes are _____________ so that each cannot access objects outside its permitted domain






15. Requires more stringent authentication mechanisms and well-defined interfaces among layers.






16. When the RAM and secondary storage are combined the result is __________.






17. Accreditation is also defined as an ____________________ by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards






18. Certification is a Technical review that assesses the _____________ - where as Accreditation is management's Official acceptance of the information in the Certification process findings.






19. The Bell-LaPadula Model is a _______________ that enforces Confidentiality aspect of access control. Formed by David Bell and Leonard LaPadula.






20. Best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system?






21. Security is made up of: System administration - ________ - installation and configuration mechanisms within the environment - and other security issues.






22. A nonvolatile storage media etc computer hard drive - floppy disks and CD-ROMs






23. In the Bell-LaPadula Model the Subject's Label contains ___________________.






24. Operating System Kernel






25. The reserved hard drive space used to Extend RAM capabilities. Windows system use the pagefile.sys file to reserve this space






26. This type of environment is highly secured environment that processes very sensitive information. It requires systems that are highly resistant to penetration.






27. Security Policies that prevent information from flowing from a higher security level to a lower security level are called ____________.






28. Discretionary protection






29. Bell-LaPadula Model -______________: A subject in a given security level can NOT WRITE information to a LOWER security level.






30. Software - hardware and firmware must be able to be tested individually to ensure that each enforces the security policy in an effective manner throughout their lifetimes.






31. Levels of Security and Levels of Trust Lower Letters of the alphabet represent higher levels of security. Higher numbers indicate a greater level of trust.






32. When a computer spends more time moving data from one small portion of memory to another THAN Actually processing the data






33. Execute one instruction at a time.






34. Based on a known address with an offset value applied.






35. Reference Monitor is responsible for ______________ it compares the security labels of a subject and an object






36. In both the Bell-LaPadula and Biba Models if the word "Simple is used ______________.






37. In an automated system ________________ could be achieved by: A computer system designed to identify individuals responsible for any input.






38. The _________________ specified in the Orange Book are: System architecture - System integrity - Covert channel analysis - Trusted facility management and Trusted recovery.






39. As per FDA data should be ______________________________.






40. When a portion of primary memory is accessed by specifying the actual address of the memory location






41. The Bell-LaPaula Model's main goal was to ___________________ in an unauthorized manner. (Developed by the US gov)






42. System Architecture that separates system functionality into Hierarchical layers






43. The combination of RAM - Cache and the Processor Registers






44. The Indexed memory addresses that software uses






45. Developed after the Bell-LaPadula model. Its a state machine model and is very similar to the Bell-LaPadula Model.






46. The Availability - Integrity and confidentiality requirements of multitasking operating systems






47. A type of memory used for High-speed writing and reading activities.






48. Minimal Security






49. Which uses Protection Profiles and Security Targets?






50. THE (Technische Hogeschool Eindhoven) - VAX/VMS - Multics and Unix . THE and Multics are no longer in use