Chapter 7 Β· Security Quiz

Test Your Knowledge
Security Design & Models

25 questions across 4 categories. Keyword-graded answers with instant explanations.

0 / 25
Score: 0
πŸ”

Architecture Principles

Questions 1–8

Question 1 Multiple Choice
Which security architecture principle states that security requirements should be addressed from the very beginning of development β€” not as an afterthought?
Question 2 True / False
The principle of Fail Secure prioritizes availability β€” it disables the security control so users can still access the system even when something goes wrong.
Question 3 Short Answer
Scenario: A financial organization ensures that the same person who initiates a wire transfer cannot also approve it. What security principle does this demonstrate?
Question 4 Multiple Choice
A database admin is only given access to the databases they directly manage β€” not to HR systems, application servers, or other unrelated resources. This is an example of:
Question 5 Short Answer
An enterprise deploys a perimeter firewall, an IDS, network segmentation, secure endpoints, AND encryption β€” so that if the firewall is bypassed, other controls still protect the network. What principle does this represent?
Question 6 True / False
Zero Trust is a security model that assumes all internal network users are trusted, but external users must be verified before access is granted.
Question 7 Multiple Choice
Which of the following BEST describes the "Default Deny" principle?
Question 8 Short Answer
Name two ongoing maintenance tasks that are required because "Security is a Process" β€” meaning security must be maintained over time.
⚠️

Architecture Flaws & Attacks

Questions 9–14

Question 9 Multiple Choice
A technique used to transfer information in a secretive, unauthorized manner β€” either by exploiting shared resources like RAM/CPU or by accessing storage media β€” is called a:
Question 10 Short Answer
Scenario: A malicious employee at a bank writes code that rounds down each transaction by $0.001 and deposits those fractions into a hidden account. Over millions of transactions, this accumulates into a large theft that went undetected. What type of attack is this?
Question 11 True / False
A Maintenance Hook (backdoor) is a legitimate and safe feature because it is only accessible to authorized developers.
Question 12 Multiple Choice
Which type of covert channel involves one process accessing the timing or usage of a shared system resource (such as CPU or RAM) to leak information to another process?
Question 13 Short Answer
What is Data Diddling? Describe when it occurs.
Question 14 Multiple Choice
Which protection mechanism ensures that a system returns to a known-good secure state after a failure or discontinuity, preventing the failure from compromising secure operation?
πŸ›‘οΈ

CIA Techniques & OS Concepts

Questions 15–18

Question 15 Short Answer
What is process confinement, and give one real-world technology that implements it?
Question 16 True / False
In the OS ring model, Ring 0 (the Kernel) has the least privilege, while Ring 3 (Applications) has the most privilege.
Question 17 Multiple Choice
If a compromised program is processing sensitive data, which aspect of the CIA triad is MOST directly threatened?
Question 18 Short Answer
What does Process Isolation guarantee in an operating system?
πŸ—‚οΈ

Security Models

Questions 19–25

Question 19 Multiple Choice
The Bell-LaPadula model is designed to enforce which security property?
Question 20 Short Answer
Scenario: A user with "Secret" clearance tries to read a "Top Secret" document. According to Bell-LaPadula, is this allowed? Name the rule that applies.
Question 21 Multiple Choice
The Biba model's "No Read Down" rule means:
Question 22 True / False
In the Access Control Matrix, the columns represent Capability Lists tied to subjects (users).
Question 23 Short Answer
What are the four rules of the Take-Grant model? List them.
Question 24 Multiple Choice
Which statement CORRECTLY compares Bell-LaPadula and Biba?
Question 25 Short Answer
Scenario: A "Top Secret" cleared analyst wants to write a report summary into an "Unclassified" document. According to Bell-LaPadula, is this allowed? What rule applies and why?
0
/ 25
β€”

β€”

β€”

0
Correct
0
Wrong
0%
Score