CISSP Lesson 5 PreTest Flashcards

2
Q

Subjects should have least privileges on a system until they have been proven trustworthy.
A) TRUE
B) FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which category defined in the Trusted Computer System Evaluation Criteria provides basic access control?
A) Discretionary protection
B) Minimal protection
C) Verified protection

A

Discretionary protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware is any tangible part of a computer system, whereas firmware is software stored on a ROM chip.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of RAM uses flip-flop circuits?
A) Dynamic RAM
B) Static RAM

A

Static RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are closed systems and open systems different?
A) Open systems cannot connect to other systems as well as closed systems
B) Open systems are easier to evaluate than closed systems
C) Open systems are proprietary and closed systems are not

A

Open systems are easier to evaluate than closed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which are characteristics of virtual memory? Choose all that apply.
A) Small, high-speed memory
B) Allows programs to address memory larger than the physical memory
C) Requires multiple clock cycles
D) Uses memory management unit to translate addresses

A

Allows programs to address memory larger than the physical memory
Uses memory management unit to translate addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which operating state requires specific protection mechanisms to prevent data from crossing security level boundaries?
A) Single state
B) Multistate

A

Multistate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When running in user mode, only a subset of the full instruction set is available.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The time of check/time of use lapse is often used by attackers to exploit the system.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which component of a CPU accesses and interprets instructions?
A) Control unit
B) Arithmetic logic unit
C) Register

A

Control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which are characteristics of the Clark-Wilson model? Choose all that apply.
A) Primarily for commercial applications
B) Enforces integrity
C) Uses security labels
D) Based on the state machine concept
A

Primarily for commercial applications
Enforces integrity
Uses security labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security level is needed to prohibit covert channels?
A) Level D or above
B) level C2 or above
C) Level B2 or above

A

Level B2 or above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Input and parameter checking flaws may lead to spoofing exploits.
A) TRUE
B) FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which are steps of the execution cycle? Choose all that apply.
A) Fetch the instructions
B) Decode the instructions
C) Execute the instructions
D) Encode the instructions
A

Fetch the instructions
Decode the instructions
Execute the instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

With pipelining, each cycle must complete before starting on the next instruction.
A) TRUE
B) FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which are characteristics of the Bell-LaPadula model? Choose all that apply.
A) Protects classified information
B) Supports a single state
C) Addresses data confidentiality only
D) Designed to prevent unauthorized modification
E) Built on the state machine concept

A

Protects classified information
Addresses data confidentiality only
Built on the state machine concept

18
Q

The Noninterference model protects state changes from cascading into other, unintended areas.
A) TRUE
B) FALSE

A

TRUE

19
Q

What do security perimeters and DMZs provide?
A) Accessibility
B) Data monitoring
C) Physical isolation

A

Physical isolation

20
Q

Which subcategory of mandatory protection provides security labels and assurance that no covert channels exist?
A) Labeled security
B) Structured protection
C) Security domains

A

Structured protection

21
Q

Which type of storage is CPU accessible directly?
A) Real storage
B) Primary Storage
C) Secondary storage

A

Primary Storage