This CISSP quiz focuses on Security Architecture and Design, assessing knowledge in frameworks like SABSA, ITIL, and standards such as ISO 27001. It covers lifecycle development, service transitions, security policies, and matrix-based models, essential for professionals aiming to certify or deepen their understanding in security architecture.
Service strategy
Service design
Service transition
Service operations
Rate this question:
Threat modeling
Data classification
Risk assessments
All of the above
Rate this question:
ISO 15408
ISO 27001
ISO 9001
ISO 9146
Rate this question:
Security kernel
Security policy
Security model
Security reference monitor
Rate this question:
Multilevel lattice
State machine
Noninterference
Matrix-based
Rate this question:
Biba
Clark–Wilson
Brewer–Nash
Bell–LaPadula
Rate this question:
Simple property
* (star) property
Invocation property
Strong * property
Rate this question:
Brewer–Nash
Clark–Wilson
Bell–LaPadula
Lipner
Rate this question:
Bell–LaPadula
Biba
Chinese Wall
Graham–Denning
Rate this question:
15408
27000
TCSEC
ITSEC
Rate this question:
Protection profiles
Security target
Trusted computing Base
Ring protection
Rate this question:
EAL 1
EAL 3
EAL 5
EAL 7
Rate this question:
Certification
Accreditation
Validation
Verification
Rate this question:
Initial
Managed
Defined
Optimizing
Rate this question:
Threat/risk assessment
Penetration testing
Vulnerability assessment
Data classification
Rate this question:
Access control
Boundary control
Integrity
Audit and monitoring
Rate this question:
The 3G protocol is inherently insecure
Lower processing power
Hackers are targeting mobile devices
The lack of antivirus software.
Rate this question:
They are typically installed by end-users and granted access to supervisor state to help them run faster.
Th ey are typically installed by administrators and granted access to user mode state to help them run faster.
Th ey are typically installed by software without human interaction.
They are integrated as part of the operating system.
Rate this question:
Layering
Data hiding
Cryptographic protections
Abstraction
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.