5 - Security Architecture and Design Flashcards
- What is the principle of least privilege?a. All users are assigned a minimum standard level of access, then additional access is granted as neededb. A system is designed so there are the fewest number of different security access levels as possiblec. Users are assigned only enough access to accomplish their work tasksd. The least privileged users are assigned roles
C: The principle of least privilege is users are assigned only enough access to accomplish their work tasks.
- What security model is a directed graph that indicates the rights or privileges that a subject can transfer to an object or that a subject can obtain from another subject?a. State machine modelb. Bell-LaPadula modelc. Clark-Wilson modeld. Take-grant model
D: The take-grant model is a directed graph that indicates the rights or privileges that a subject can transfer to an object or that a subject can obtain from another subject.
- If the operating system fails to establish boundaries for the size and type of data that can be inputted, what malicious event or activity can occur?a. Denial of serviceb. Logic bombc. Buffer overflowd. Virus infection
C: Failing to control input may result in a buffer overflow.
- Which operating state represents a process in normal execution?a. Ready stateb. Wait statec. Supervisory stated. Problem state
D: The problem state is the state of a process performing normal execution.
- In order for an OS to remain stable, what must it be able to accomplish or perform?a. At least one calculation per secondb. Grant limited access to unauthorized usersc. Protect itself from users and softwared. Operate at Ring 3
C: An OS must protect itself from users and software to remain stable.
- What mode of operation exists when all users have the authorization and need-to-know to access all resources?a. Dedicated security modeb. System-high security modec. Compartmentalized security moded. Multilevel security mode
A: Dedicated security mode exists when all users have the authorization and need-to-know to access all resources.
- At which Ring of protection do device drivers operate?a. Ring 0b. Ring 1c. Ring 2d. Ring 3
C: Ring 2 is for device drivers.
- What mechanism is used for a lower protection ring entity to communicate with a higher protection ring entity?a. Hashingb. RPCc. Covert channeld. System call
D: A system call is needed for a lower protection ring entity to communicate with a higher protection ring entity.
- Of the four possible operating states of a system, which represents the state within which an application is being actively processed?a. Problem stateb. Ready statec. Wait stated. Supervisory state
A: The problem state is the execution of an application.
- The orange book security classifications such as C2 and B1 are focused on what?a. The entire computerb. The trusted computer basec. The entire networkd. Just the CPU and primary storage
B: The orange book classifications are focused on the TCB.
- Secondary storage is?a. Nonvolatile storage, such as a hard driveb. The RAM in a computerc. Allocated memory for programsd. The combination of RAM and space from a paging file
A: This is secondary storage.
- What is the most trusted component of a computer?a. Memoryb. CPUc. Hard drived. Network interface
B: The CPU is the most trusted component of a computer.
- A buffer overflow can cause all but which of the following?a. network throttlingb. system freezingc. system rebootingd. data corruption
A: Network throttling is usually not a function, symptom, or effect of a buffer overflow. Network throttling is a control feature to limit the bandwidth consumed by a specific application or service
- Once data has been processed by the CPU for a program, it is moved into memory areas known as?a. primary storageb. real storagec. secondary storaged. virtual storage
B: Once data has been processed by the CPU, it is moved into memory areas known as real storage. Real storage is the memory address space allocated for use by programs.
- What type of memory storage requires constant updates because the data it stores dissipates and decays?a. Static RAM or Random Access Memoryb. ROM or Read Only Memoryc. Dynamic RAM or Random Access Memoryd. EPROM or Erasable and Programmable Read Only Memory
C: Dynamic RAM or Random Access Memory requires constant updates because the data it stores dissipates and decays.
- Which of the following is the fastest form of memory?a. secondaryb. virtualc. reald. cache
D: Cache memory is a form of high-speed memory accessed directly by the CPU that operates at a higher rate than real memory.
- For security to be effective which of the following should not be true?a. security is added to a product after its initial developmentb. security is integrated into a product at the design stagec. security is engineered into the productd. security is implemented by default in the product
A: Adding security as an afterthought is not an effective means to provide adequate, functional, or even reliable security.
- Once security is implemented into the design of a product, it should also be all but which of the following?a. testedb. disabledc. certifiedd. audited
B: Security should not be disabled once it has been integrated into a product.
- If the operating system or an application fails to set boundaries on input data, what problem can occur?a. session hijackingb. access grabbingc. buffer overflowd. information disclosure
C: Failing to defined boundaries for input can result in a buffer overflow error.
- When a buffer overflow occurs, the extra data may flow into the CPU and cause what?a. loss of privilegesb. the system to drop the extra datac. an error event log is writtend. execution of malicious code in privileged mode
D: Buffer overflows often result in the execution of malicious code in privileged mode.
- The act of positioning data in one security division that is not accessibly by a subject of another security division is called what?a. Data hidingb. Layeringc. Data diddlingd. Abstraction
A: Data hiding is the placement of data in a different security level than a given subject in order to hide it from that subject.
- Which of the following security models is focused on protecting confidentiality?a. Biba modelb. Bell-LaPadula modelc. Take-Grant modeld. Clark-Wilson model
B: The Bell-LaPadula model is focused on protecting confidentiality.
- Which of the books from the Rainbow series is concerned with the interactions of computers over a communication medium?a. Orangeb. Tanc. Redd. Purple
C: The red book is concerned with the interactions of computers over a communication medium
- The ability for a single processor computer system to execute more than one process simultaneously is known as?a. multithreadingb. multitaskingc. multiprocessingd. multiplexing
B: Multitasking is when a computer system can execute more than one process simultaneously.