Chapter 9 Flashcards

1
Q

What describes where multiple concurrent tasks can operate under a single process?

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ring has the highest level of privilege and usually the kernel resides on this level.

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What ring deals with the various tasks, operations performed, processes switched and so forth.

A

Ring 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What ring deals with I/O drivers and system utilities resides and can access peripheral devices and other special files.

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What ring runs in user mode ?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What rings run in supervisory/privilege mode ?

A

Ring 0-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What processing state represents when a process can resume or begin processing as soon as it is schedule for execution.

A

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What processing state represents when a process executes on a CPU and keeps going until it finishes, its time splice expires, or is blocked.

A

Running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What processing state represents when a process is ready for continued execution but is waiting for I/O to be serviced before it can continue processing.

A

Waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What processing state represents when a process must perform an action that requires privileges that are greater than the problem state’s set of privileges.

A

Supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of flash memory ?

A

NAND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many registers does a typical CPU have?

A

8 to 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When the CPU needs information from one of its registers to complete an operation, what does it use ?

A

Register Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is not a memory addressing scheme but rather a way of referring to data that is supplied to the CPU as part of its instruction.

A

Immediate Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is more flexible than immediate addressing?

A

Direct Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What describes where the CPU is provided with an actual address of the memory location to access ?

A

Direct Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What uses a scheme similar to direct addressing?

A

Indirect Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What describes where the CPU reads one address and is then given the actual address where the data resides.

A

Indirect Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What uses a value stored in one of the CPUs’s registers or pointers as the base location from which to begin counting.

A

Base+Offset Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the most common type of virtual memory ?

A

Pagefile/Swapfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What contains data previously stored in real memory but not recently used ?

A

Pagefile/Swapfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a special type of secondary memory that is used to expand the addressable space of real memory?

A

Virtual Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What term is commonly used to refer to magnetic, optical, or flash based media or other storage devices?

A

Secondary Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the primary drawback with virtual memory ?

A

Paging operations that occur between primary and secondary memory is slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a common sequential storage device ?

A

Magnetic Tape Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What attack freezes memory chips to delay the decay of resident data when the system is turned off.

A

Cold Boot Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an effective safeguard against emanation attacks ?

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What describes a box, mobile room, or entire building designed with external metal skin that surround the outside.

A

Faraday Cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a TEMPEST countermeasure that implements both a faraday cage and white noise to protect a specific area.

A

Control Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are all the techniques that can protect against emanation?

A

Shielding, TEMPEST countermeasures, and antenna management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What replaced BIOS?

A

UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What provides support for larger hard drives, faster boot times, enhanced security features, and use a mouse during BIOS changes.

A

UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What describes the implementation of a malicious variation of official BIOS or firmware is installed?

A

Phlashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What ensures that only drivers and OSs that are pre approved by digital certificate is installed?

A

Boot Attestation/Secure Boot

35
Q

What protects against rootkits and backdoors when the system is booting ?

A

Boot Attestation/Secure Boot

36
Q

What is an optional feature of UEFI that takes a hash calculation of every element involved in the booting process?

A

Measured Boot

37
Q

What prohibits JavaScript code from accessing content from another origin?

A

Same-Origin Policy

38
Q

What are some ways to protect your website from JavaScript exploitation?

A

Keep browsers updated (client-side)

Implement JavaScript subsets (ADsafe, Caja, Secure ECMAScript) (server-side)

Use a content security policy

39
Q

What attempts to enforce same-origin restrictions for most browser side active technologies.

A

CSP

40
Q

What are some browser helper objects and extensions that help reduce JavaScript exploitation?

A

Firefox NoScript

Edge and Chrome UBlock

41
Q

What describes where processors share not only a common OS, but also a common data bus and memory resources.

A

SMP

42
Q

What describes where processors operate independently and have their own OS, data bus, and memory resources.

A

AMP

43
Q

What describes where numerous AMP systems are linked together to complete one task?

A

MPP

44
Q

What is similar to grid computing but has no central management system and services are done in real time.

A

Peer to peer

45
Q

What are some security concerns with peer to peer computing?

A

Pirating copyright materials

Eavesdropping on distributed content

Lack of central control/oversight

All services being consumed at once

46
Q

What are some industrial control systems?

A

DCS
PLC
SCADA

47
Q

What Industrial control system focuses on processes and is state driven?

A

DCS

48
Q

What industrial control system focuses on data-gathering and is event driven?

A

SCADA

49
Q

Which industrial control system is suitable for managing systems over large geographic areas?

A

SCADA

50
Q

What industrial control system is more suitable for large scale environments in a single location?

A

DCS

51
Q

What are some common security controls for DCS, PLC, and SCADA systems?

A

Isolating networks

Limiting access logically and physically

Code restrictions

Logging activity

52
Q

What are some common DCE IDLs?

A

RPC
CORBA
DCOM

53
Q

What are some security concerns with DCEs?

A

Interconnectedness of components

Access by unauthorized users

Masquerading, impersonation, or spoofing attacks

Security control bypass or disablement

Communication eavesdropping

Insufficient authentication

Lack of monitoring, logging, and auditing

Accountability issues

54
Q

What are two ways to secure DCEs?

A

Encryption
Strong multi factor authentication

55
Q

What happens when a service is running on insufficient resources, has an unforeseen traffic spike, or when supporting systems fail.

A

Benign DoS

56
Q

When is a hard-real time solution for RTOS used?

A

Mission Critical Operations

57
Q

When is a soft real-time solution for RTOS used ?

A

Consumer electronics

58
Q

What type of RTOS system will switch between operations or tasks based on pre assigned priorities?

A

Event-driven RTOS

59
Q

What type of RTOS system will switch between operations or tasks based on clock interruptions or specific time intervals.

A

Time-sharing RTOS

60
Q

What are some security concerns with RTOS?

A

Use of custom code that could include bugs or flaws

May process bogus datasets or requests by malware

61
Q

What are ways to secure RTOS systems?

A

Isolation

Communication monitoring

62
Q

What are some ways to secure IoT devices ?

A

Deploy a separate network

Keeping systems patched

Limiting physical and logical access

Monitoring all activity

Implementing firewalls and filtering

63
Q

What are some examples of microcontrollers?

A

Raspberry Pi
Arduino
FPGA

64
Q

What describes the use of classification labels on data and packets?

A

Logical Isolation

65
Q

What describes the implementation of network segmentation or air gaps between networks of different security levels ?

A

Physical Isolation

66
Q

What occurs when an org deploys numerous VMs without an overarching IT management or security plan in place?

A

VM sprawl

67
Q

How can you prevent/avoid a VM sprawl?

A

Establishing a policy for developing and deploying VMs

68
Q

When occurs when software within a guest OS is able to breach isolation protection provided by the hypervisor to violate the container of other guest OSs?

A

VM Escape

69
Q

What are some ways to stop/mitigate VM escape ?

A

Keep sensitive systems and data on separate physical machines

Keep all hypervisor softwares current with vendor patches

Monitor attack, exposure, and abuse indexes

70
Q

What was intended to replace MDM and EMM and is a single management platform to support mobile devices, IoT, PC, wearables, and ICS.

A

UEM

71
Q

What prevents any and all software including malware from execution unless they’re on the pre approved list?

A

Application Allow Listing / Whitelisting

72
Q

What is the activity of of installing an app on a device by bringing the installer file to the device through a file transfer or USB?

A

Side loading

73
Q

What can prevent side loading ?

A

Enforcing all apps to be digitally signed

74
Q

What conveys information by altering the performance of a system in a predictable manner?

A

Covert Timing Channel

75
Q

What conveys information by writing data to a common storage area where another process can read it ?

A

Covert Storage Channel

76
Q

What malware can hid from detection, and prevent its files and processes from being viewed?

A

Rootkit

77
Q

What are two forms of incremental attacks ?

A

Salami
Data Diddling

78
Q

What happens when an attacker gains access to a sys and makes small incremental changes to data during storage, processing input, and output ?

A

Data Diddling

79
Q

What are ways to protect against data diddling ?

A

Encrypting file systems

File Monitoring integrity checking

80
Q

What attack represents where an attacker slowly steals away at assets or other records of financial value?

A

Salami

81
Q

What are ways to protect against salami attacks ?

A

Separation of duties

Proper employee education

Control over code

82
Q

What describes the change in how hardware management is viewed as another collection to be managed the same way software is managed.

A

IaC

83
Q

What is a framework to automate the processes of network monitoring and response?

A

SDV

84
Q

What is the concept of replacing physical elements with solutions provided virtually by a third party provider.

A

SDDC / VDC