1、CISSP 认证考试(安全体系结构和设计)-试卷 1 及答案解析(总分:64.00,做题时间:90 分钟)1.Lacys manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compares their ratings. Which of the following are the evaluation criteria most in use today for
2、these types of purposes?(分数:2.00)A.ITSECB.Common CriteriaC.Red BookD.Orange Book2.Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?(分数:2.00)A.Increased circuits, cache memory, and multiprogrammingB.Dual mode computationC.Direct memor
3、y access I/OD.Increases in processing power3.CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?(分数:2.00)A.The user and applicationB.The program that is loaded into memoryC.The operating sy
4、stemD.The CPU and user4.Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage?(分数:2.00)A.More than one process uses the same resource.B.It allows cookies to remain persistent in memory.C.It allows for side-cha
5、nnel attacks to take place.D.Two processes can carry out a denial-of-service.5.Which of the following is a common association of the Clark-Wilson access model?(分数:2.00)A.Chinese WallB.Access tupleC.Read up and write down ruleD.Subject and application binding6.Which of the following correctly describ
6、es the relationship between the reference monitor and the security kernel?(分数:2.00)A.The security kernel implements and enforces the reference monitor.B.The reference monitor is the core of the trusted computing base, which is made up of the security kernel.C.The reference monitor implements and enf
7、orces the security kernel.D.The security kernel, aka abstract machine, implements the reference monitor concept.7.The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive information. What function does t
8、he TCB initiate to ensure that this is done in a secure manner?(分数:2.00)A.I/O operational executionB.Process deactivationC.Execution domain switchingD.Virtual memory to real memory mapping8.The Zachman Architecture Framework is often used to set up an enterprise security architecture. Which of the f
9、ollowing does not correctly describe the Zachman Framework?(分数:2.00)A.A two-dimensional model that uses communication interrogatives intersecting with different levelsB.A security-oriented model that gives instructions in a modular fashionC.Used to build a robust enterprise architecture versus a tec
10、hnical security architectureD.Uses six perspectives to describe a holistic information infrastructure9.John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of
11、IT and business processes. Which of the following frameworks should he suggest?(分数:2.00)A.DoDAFB.CMMIC.ISO/IEC 42010D.TOGAF10.Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establishes the type and intensity of the evaluation?(分数:2.00
12、)A.Descriptive elementsB.Evaluation assurance requirementsC.Evaluation assurance levelD.Security target11.Which of the following best defines a virtual machine?(分数:2.00)A.A virtual instance of an operating systemB.A piece of hardware that runs multiple operating system environments simultaneouslyC.A
13、 physical environment for multiple guestsD.An environment that can be fully utilized while running legacy applications12.Bethany is working on a mandatory access control (MAC) system. She has been working on a file that was classified as Secret. She can no longer access this file because it has been
14、 reclassified as Top Secret. She deduces that the project she was working on has just increased in confidentiality and she now knows more about this project than her clearance and need-to-know allows. Which of the following refers to a concept that attempts to prevent this type of scenario from occu
15、rring?(分数:2.00)A.Covert storage channelB.Inference attackC.NoninterferenceD.Aggregation13.Virtualization offers many benefits. Which of the following incorrectly describes virtualization?(分数:2.00)A.Virtualization simplifies operating system patching.B.Virtualization can be used to build a secure com
16、puting platform.C.Virtualization can provide fault and error containment.D.Virtual machines offer powerful debugging capabilities.14.Which security architecture model defines how to securely develop access rights between subjects and objects?(分数:2.00)A.Brewer-NashB.Clark-WilsonC.Graham-DenningD.Bell
17、-LaPadula15.Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the others internal programming code?(
18、分数:2.00)A.Virtual mappingB.Encapsulation of objectsC.Time multiplexingD.Naming distinctions16.Which of the following is not a responsibility of the memory manager?(分数:2.00)A.Use complex controls to ensure integrity and confidentiality when processes need tp use the same shared memory segments.B.Limi
19、t processes to interact only with the memory segments assigned to them.C.Swap contents from RAM to the hard drive as needed.D.Run an algorithm to identify unused committed memory and inform the operating system that the memory is available.17.Several types of read-only memory devices can be modified
20、 after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM?(分数:2.00)A.PROM can only be programmed once, while EEPROM can be programmed multiple times.B.A UV light is used to erase data on EEPROM, while onboard programming circuitry an
21、d signals erase data on EPROM.C.The process used to delete data on PROM erases one byte at a time, while to erase data on an EPROM chip, you must remove it from the hardware.D.The voltage used to write bits into the memory cells of EPROM burns out the fuses that connect individual memory cells, whil
22、e UV light is used to write to the memory cells of PROM.18.There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another processs request until the I/O device is ready for more
23、data?(分数:2.00)A.I/O using DMAB.Interrupt-driven I/OC.Programmable I/OD.Premapped I/O19.The Information Technology Infrastructure Library(ITIL) consists of five sets of instructional books. Which of the following is considered the core set and focuses on the overall planning of the intended IT servic
24、es?(分数:2.00)A.Service OperationB.Service DesignC.Service TransitionD.Service Strategy20.Widgets Inc.s software development processes are documented and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels
25、 best describes Widgets Inc.?(分数:2.00)A.InitialB.RepeatableC.DefinedD.Managed21.There are several different important pieces to the Common Criteria. Which of the following best describes the first of the missing components? (分数:2.00)A.Target of evaluationB.Protection profileC.Security targetD.EALs22
26、.Different access control models provide specific types of security measures and functionality in applications and operating systems. What model is being expressed in the graphic that follows? (分数:2.00)A.NoninterferenceB.BibaC.Bell-LaPadulaD.Chinese Wall23.There are many different types of access co
27、ntrol mechanisms that are commonly embedded into all operating systems. Which of the following is the mechanism that is missing in this graphic? (分数:2.00)A.Trusted computing baseB.Security perimeterC.Reference monitorD.Domain24.There are several security enforcement components that are commonly buil
28、t into operating systems. Which component is illustrated in the graphic that follows? (分数:2.00)A.Virtual machinesB.InterruptC.Cache memoryD.Protection rings25.A multitasking operating system can have several processes running at the same time. What are the components within the processes that are sh
29、own in the graphic that follows? (分数:2.00)A.ThreadsB.RegistersC.Address busesD.Process tablesThe following scenario applies to questions 26 and 27.Charlie is a new security manager at a textile company that develops its own proprietary software for internal business processes. Charlie has been told
30、that the new application his team needs to develop must comply with the ISO/IEC 42010 standard. He has found out that many of the critical applications have been developed in the C programming language and has asked for these applications to be reviewed for a specific class of security vulnerabiliti
31、es.(分数:4.00)(1).Which of the following best describes the standard Charlies team needs to comply with?(分数:2.00)A.International standard on system design to allow for better quality, interoperability, extensibility, portability, and securityB.International standard on system security to allow for bet
32、ter threat modelingC.International standard on system architecture to allow for better quality, interoperability, extensibility, portability, and securityD.International standard on system architecture to allow for better quality, extensibility, portability, and security(2).Which of the following is
33、 Charlie most likely concerned with in this situation?(分数:2.00)A.Injection attacksB.Memory blockC.Buffer overflowsD.Browsing attacksThe following scenario applies to questions 28 and 29.Tims development team is designing a new operating system. One of the requirements of the new product is that crit
34、ical memory segments need to be categorized as nonexecutable, with the goal of reducing malicious code from being able to execute instructions in privileged mode. The team also wants to make sure that attackers will have a difficult time predicting execution target addresses.(分数:4.00)(1).Which of th
35、e following best describes the type of protection that needs to be provided by this product?(分数:2.00)A.Hardware isolationB.Memory induction applicationC.Data execution preventionD.Domain isolation protection(2).Which of the following best describes the type of technology the team should implement to
36、 increase the work effort of buffer overflow attacks?(分数:2.00)A.Address space layout randomizationB.Memory induction applicationC.Input memory isolationD.Read-only memory integrity checksThe following scenario applies to questions 30, 31, and 32.Operating systems have evolved and changed over the ye
37、ars. The earlier operating systems were monolithic and did not segregate critical processes from noncritical processes. As time went on operating system vendors started to reduce the amount of programming code that ran in kernel mode. Only the absolutely necessary code ran in kernel mode, and the re
38、maining operating system code ran in user mode. This architecture introduced performance issues, which required the operating system vendors to reduce the critical operating system functionality to microkernels and allow the remaining operating system functionality to run in client/server models wit
39、hin kernel mode.(分数:6.00)(1).Which of the following best describes the second operating system architecture described in the scenario?(分数:2.00)A.LayeredB.MicrokernelC.MonolithicD.Kernel based(2).Which of the following best describes why there was a performance issue in the context of the scenario?(分
40、数:2.00)A.Bloated programming codeB.I/O and memory location proceduresC.Mode transitionsD.Data and address bus architecture(3).Which of the following best describes the last architecture described in this scenario?(分数:2.00)A.Hybrid microkernelB.LayeredC.MonolithicD.Hardened and embeddedCISSP 认证考试(安全体
41、系结构和设计)-试卷 1 答案解析(总分:64.00,做题时间:90 分钟)1.Lacys manager has tasked her with researching an intrusion detection system for a new dispatching center. Lacy identifies the top five products and compares their ratings. Which of the following are the evaluation criteria most in use today for these types of
42、purposes?(分数:2.00)A.ITSECB.Common Criteria C.Red BookD.Orange Book解析:解析:B 正确。通用准则(Common Criteria)创建于 20 世纪 90 年代早期,它结合了可信计算机系统评测标准(Trusted Computer System Evaluation Criteria,TCSEC)和信息技术安全评估标准(Information Technology Security Evaluation Criteria,ITSEC)的优点,同时减少了它们的不足。这些评估标准比 TCSEC 更灵活、比 ITSEC 更通俗易懂。通
43、用准则是全球公认的,它有助于降低等级的复杂性,减少对不同评估方案中不同等级的定义和意义的理解,从而有效地帮助了消费者。这对生产商也大有裨益,因为现在如果他们希望在国际上销售产品,便可以只根据一套具体要求来构建这些产品,而无须同时满足不同规则和要求的几个不同的等级。 A 不正确。因为 ITSEC 或信息技术安全评价标准应用不是最为广泛。ITSEC 是许多欧洲国家建立计算机系统和产品的安全属性单一评价标准的首次尝试。此外,ITSEC 在评价时把功能和保证分割开来,并对它们分别制定了一个单独的评价等级。它的开发是为了提供比 TCSEC 更多的灵活性,并解决网络系统中的完整性、可用性和保密性问题。尽管
44、 ITSEC 的目标是成为产品评估的世界通用标准,然而它的目标并未实现,反而被通用准则所代替。 C 不正确。因为红皮书(Red Book)是美国政府发布的解决网络和网络组件安全评估问题的出版物。红皮书的正式名称为 Trusted Network Interpretation,这本书为不同类型的网络提供了安全框架。网络上主体对客体的访问需要受到控制、监督和审计。 D 不正确。因为橘皮书(Orange Book)是美国政府发布的主要解决政府和军事对操作系统的要求和期望的出版物。橘皮书用来评价一个产品是否真正包含供应商所声称包含的安全属性,以及判断一个产品是否适合某一特定应用或功能。橘皮书用来审核产
45、品的功能性、有效性,以及在评估过程中确保产品,它使用了解决典型安全需求模式的分类。橘皮书提供了一个构建和评估可信系统的广泛框架,侧重于控制哪些用户能够访问系统。橘皮书的另外一个名称为可信计算机系统评测标准(Trusted Computer System Evaluation Criteria,TCSEC)。2.Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?(分数:2.00)A.Increased circuit
46、s, cache memory, and multiprogrammingB.Dual mode computationC.Direct memory access I/OD.Increases in processing power 解析:解析:D 正确。随着个人电脑的增多和服务器处理能力的增强,在安全机制方面,在几年前不可能成功的蛮力攻击和破解攻击现在更有可能成功。如今的处理器每秒钟执行的指令数目惊人。这些指令可用于尝试破解密码或加密密钥或指令,向受害系统发送恶意数据包。 A 不正确。因为增加电路、高速缓存和多道程序设计(multiprogramming)并不会使特定类型的攻击更为有效。多
47、道程序设计指的是不止一个程序或进程同时被加载到内存中。它使得用户可以同时运行防病毒软件、Word 处理器、防火墙和电子邮件客户等。高速缓存是一种用于高速读写活动的存储器。当系统(通过它的编程逻辑)认为它在处理活动过程中需要多次访问特定信息时,它将把这些特定信息存储在高速缓存中以便方便快捷地进行访问。 B 不正确。因为这个选项是个干扰项。在考试微处理器方面的发展时,这种双模式计算并不真正存在。 C 不正确。因为直接内存访问(direct memory access,DMA)是指不使用 CPtJ 而在输入输出(IO)设备和系统内存之间传输指令和数据的方式。这大大提高了数据传输速度。DMA 基本上是
48、通过利用计算机系统内的其他处理能力保证多个单指令得到解释和执行,从而达到减轻 CPU 负担的目的。这不是微处理器技术的进步。3.CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?(分数:2.00)A.The user and applicationB.The program that is loaded into memor
49、yC.The operating system D.The CPU and user解析:解析:C 正确。操作系统开始是合作式多任务处理模式,后来演化成抢占式多任务处理模式。Windows 9x、NT、2000、XP 还有 Unix 系统都使用抢占式多任务处理模式,操作系统利用这些模式控制某一进程对资源的使用时间。系统通过时间共享的方式,能够暂停正在使用 CPU(或其他系统资源)的某进程,并允许另外一个进程访问它。因此,使用抢占式多任务处理模式的操作系统把持大局,使得运行不好的应用程序不会给其他应用程序造成负面影响。在使用合作式多任务处理模式的操作系统中,进程对资源的释放有太多的控制权,当某个应用程序中断时,它通常会影响所有其他程序,甚至有时也会影响到操作系统本身。而采用抢占式多任务处理模式的操作系统把持大局时,应用程序不会轻易地给其他应用程序带来负面影响。 A 不正确。因为在抢占式多任务处理模式下,用户和应用程序并不控制对系统资源的访问和使用。然而,在合作式多任务处理模式下,应用程序对系统资源的使用拥有更多的控制。既可以在抢占式多任务处理模式下也可以在合作式多任务处理模式下运行的是操作系统本身,而不是应用程序或用户。 B不正确。因为如答案 A 中所述,程序并不在一个特定的多任务处理模式下运行,而是在操作系统中运行。用于 Windows 31 或早期 Ma