CISSP Lesson 5 PreTest Flashcards
Subjects should have least privileges on a system until they have been proven trustworthy.
A) TRUE
B) FALSE
FALSE
Which category defined in the Trusted Computer System Evaluation Criteria provides basic access control?
A) Discretionary protection
B) Minimal protection
C) Verified protection
Discretionary protection
Hardware is any tangible part of a computer system, whereas firmware is software stored on a ROM chip.
A) TRUE
B) FALSE
TRUE
Which type of RAM uses flip-flop circuits?
A) Dynamic RAM
B) Static RAM
Static RAM
How are closed systems and open systems different?
A) Open systems cannot connect to other systems as well as closed systems
B) Open systems are easier to evaluate than closed systems
C) Open systems are proprietary and closed systems are not
Open systems are easier to evaluate than closed systems
Which are characteristics of virtual memory? Choose all that apply.
A) Small, high-speed memory
B) Allows programs to address memory larger than the physical memory
C) Requires multiple clock cycles
D) Uses memory management unit to translate addresses
Allows programs to address memory larger than the physical memory
Uses memory management unit to translate addresses
Which operating state requires specific protection mechanisms to prevent data from crossing security level boundaries?
A) Single state
B) Multistate
Multistate
When running in user mode, only a subset of the full instruction set is available.
A) TRUE
B) FALSE
TRUE
The time of check/time of use lapse is often used by attackers to exploit the system.
A) TRUE
B) FALSE
TRUE
Which component of a CPU accesses and interprets instructions?
A) Control unit
B) Arithmetic logic unit
C) Register
Control unit
Which are characteristics of the Clark-Wilson model? Choose all that apply. A) Primarily for commercial applications B) Enforces integrity C) Uses security labels D) Based on the state machine concept
Primarily for commercial applications
Enforces integrity
Uses security labels
Which security level is needed to prohibit covert channels?
A) Level D or above
B) level C2 or above
C) Level B2 or above
Level B2 or above
Input and parameter checking flaws may lead to spoofing exploits.
A) TRUE
B) FALSE
FALSE
Which are steps of the execution cycle? Choose all that apply. A) Fetch the instructions B) Decode the instructions C) Execute the instructions D) Encode the instructions
Fetch the instructions
Decode the instructions
Execute the instructions
With pipelining, each cycle must complete before starting on the next instruction.
A) TRUE
B) FALSE
FALSE