These CISSP Security Architecture And Design multiple-choice questions and their answers will help you strengthen your grip on the subject of CISSP Security Architecture And Design. You can prepare for an upcoming exam or job interview with these 30 CISSP Security Architecture And Design MCQs.
So scroll down and start answering.
A. Division D - Minimal Protection
B. Models concerned with integrity
C. Security Policy
D. Discretionary Security Property (ds-property)
A. Security rating B
B. A1
C. Controls the checks
D. Mandatory access control
A. Subject to Object Model
B. Be protected from modification
C. Reduced Instruction Set Computers (RISC)
D. Its classification label (Top Secret - Secret or confidential)
A. Security protection mechanisms
B. The National Computer Security Center (NCSC)
C. Documentation - Orange Book
D. Ring 3
A. Security Policy - Orange Book
B. Multitasking
C. Invocation Property
D. Buffer overflows
A. Stored in Reak Memory
B. Identification - Orange Book
C. C1
D. Examples of Layered Operating Systems
A. Security mechanisms and evalautes their effectivenes
B. C2 - Controlled Access Protection
C. A Domain
D. The National Computer Security Center (NCSC)
A. *-Integrity Axiom
B. Security Policy - Orange Book
C. Pipelining
D. Orange Book - A1
A. The Evaluated Products List (EPL) with their corresponding rating
B. Prohibits
C. Process isolation
D. Security Policy
A. A1
B. The security perimeter
C. A security kernel
D. Trusted Products Evaluation Program (TPEP)
A. B3
B. System High Security Mode
C. The Strong star property rule
D. The Clark Wilson integrity model
A. C1 - Discretionary Security Protection
B. The Rule is talking about writing
C. The National Computer Security Center (NCSC)
D. A security kernel
A. Buffer overflows
B. A Base Register (Memory Management)
C. State machine model
D. The Strong star property rule
A. Ring 3
B. The *-Property rule (Star property)
C. Higher or equal to access class
D. Implement software or systems in a production environment
A. The Trusted Computing Base (TCB)
B. Ring 3
C. No write down
D. Polyinstantiation
A. A security domain
B. Prevent secret information from being accessed
C. Access control to the objects by the subjects
D. Orange Book - B3
A. The Rule is talking about writing
B. The Monolithic Operation system Architecture
C. The security perimeter
D. NOT Integrity
A. Swap Space
B. Types of covert channels
C. Integrity
D. The TCSEC - Aka Orange Book
A. Enforces the rules
B. C2
C. Secondary Storage
D. Firmware
A. Continuous protection - O/B
B. Trusted hardware - Software and Firmware
C. No read up
D. Division B - Mandatory Protection Architecture
A. Programmable Read-Only Memory (PROM)
B. Multiprocessing
C. Multitasking
D. C2 - Controlled Access Protection
A. Basic Security Theorem (used in computer science) definition
B. Attributable - original - accurate - contemporaneous and legible
C. Types of covert channels
D. Identification - Orange Book
A. Primary storage
B. Accountability - Orange Book
C. Evaluated separately
D. The security perimeter
A. Bell-LaPadula Model
B. Trusted Products Evaluation Program (TPEP)
C. Trusted hardware - Software and Firmware
D. B3
A. Trusted hardware - Software and Firmware
B. Attributable data
C. Files - directories and devices
D. Direct addressing
A. Need-to-know
B. Division B - Mandatory Protection
C. The National Computer Security Center (NCSC)
D. Orange Book - D
A. First evaluation class
B. Swap Space
C. Cache Memory
D. The Common Criteria
A. Accountability - Orange Book
B. The Integrity of data within applications
C. Pagefile.sys file
D. Totality of protection mechanisms
A. Disclosure of residual data
B. The Trusted Computing Base (TCB)
C. Relative Addresses
D. Division B - Mandatory Protection
A. The Red Book
B. A Thread
C. C1
D. Accreditation
A. Inspecting packets for which there are good application proxy filtering rules
B. Inspecting packets in isolation from their context
C. Both A and B
D. Neither A nor B