Chapter 9 Flashcards

(78 cards)

1
Q

an initiative by the DHS to facilitate the open and free exchange of IOCs and other cyberthreat information between the US fed and the private sector in an automated and timely manner

A

Automated indicator sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an observable along with a hypothesis about a threat

A

indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an identified face of occurrence, such as the presence of a malicious file

A

observable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which organization manages AIS?

A

National Cybersecurity and Communications Integration Center (NCCIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6 technical mechanisms implemented via architecture

A

layering
abstraction
data hiding
trusted recovery
process isolation
hardware segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the chip that governs all major operations; can perform a limited set of logical and computational operations

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

handling two or more tasks simultaneously; a single core CPU is still only executing a single process at a time but is able to “juggle” multiple tasks for the user.

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the CPU contains multiple independent execution cores that can operate simultaneously and independently

A

Multicore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

harnessing the power of more than one processor to complete the execution of a multithreaded application

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when multiprocessor systems assign or dedicate a process or execution threat to a specific CPU

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

when multiprocessor systems assign or dedicate a process or execution threat to a specific CPU

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pseudo-simultaneous execution of two tasks on a single processor; batches or serializes multiple processes. This method delays each individual task, but across all processes in the batch total time is reduced.

A

multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

multiple concurrent tasks are performed within a single process; often used in applications where frequent context switching between active processes causes excessive overhead

A

multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an OS model that organizes code and components in to concentric rings, where the deeper inside you go the higher privilege level is associated with the code

A

protection rings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the part of an OS that always remains resident in memory so that it can run on demand at any time

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which ring does the kernel reside on?

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which ring do somewhat privileged things like I/O drivers and system utilities?

A

Ring 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

where do applications and peripheral devices reside?

A

the outermost ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which ring runs in user mode?

A

Ring 3 (outermost ring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which rings run in supervisory or privileged mode?

A

Rings 0-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

5 process states

A

ready
running
waiting
supervisory
stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

which process state is when the process executes on the CPU?

A

Running or problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which state is when a process is ready to resume or being processing?

A

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what state is when a process is ready for continued execution but is waiting for I/O to be serviced?

A

waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what state is when a process must perform an action that requires higher privileges?
supervisory mode
26
what state is when a process finishes or must be terminated?
stopped
27
the hardware component that is a storage bank for information that the computer needs to keep readily available
memory
28
memory the system can read but can't change, contents are usually burned in at the factory
ROM - Read-Only Memory
29
which part of memory includes the POST series of diagnostics that run on boot?
ROM - Read Only Memory
30
this kind of ROM isn't burnt in at the factory, but incorporates special functionality that allows an end user to burn in the chip's content later. Afterwards it cannot be altered
PROM - Programmable Read-Only Memory
31
this kind of ROM can be programmed and erased with ultraviolet light
UVEPROM - UV Erasable Programmable Read-Only Memory
32
this kind of ROM can be programmed and erased with electronic volatage
EEPROM - electronically erasable programmable read-only memory
33
a nonvolatile form of storage media that can be electronically erased and rewritten in blocks or pages. widely used on memory cards, thumb drives, mobile devices, and SSDs
flash memory
34
readable and writable memory that is retained only when power is continuously supplied to it
RAM - Random Access Memory
35
the largest RAM storage resource made of a number of dynamic RAM chips, must be refreshed by the CPU on a periodic basis
Real memory, main memory, or primary memory
36
this type of RAM contains an onboard cache of extremely fast memory used to hold data on which it will operate
cache RAM
37
this kind of RAM uses a series of capacitors to hold either a charge (1) or no charge (0)
dynamic RAM
38
this kind of RAM uses a logical device known as a flip-flop, which is basically a switch that gets moved to the on/off position to represent 1 or 0. the CPU does not need to check this RAM to make sure the positions of these flip-flops do not change, so there is no CPU overhead.
Static RAM
39
memory onboard a CPU that provides it with directly accessible memory locations that the ALU uses when performing calculations
registers
40
the brain of the CPU
Arithmetic-logical unit (ALU)
41
this memory addressing scheme refers to one of the registers
register addressing
42
this scheme refers to data that is supplied to the CPU as part of an instruction - it is not really an addressing scheme since the information does not need to be retrieved from a memory location
Immediate Addressing
43
this type of addressing scheme is the actual address of the memory location
direct addressing
44
this addressing scheme directs the CPU to a memory address that contains another memory address.
Indirect Addressing
45
this addressing scheme uses a value stored in one of the CPU's registers or pointers as the base location from which to begin counting
Base+Offset Addressing
46
this type of memory is magnetic, optical, or flash-based media that contain data not immediately available to the CPU
Secondary Memory
47
this type of memory is used to expand the addressable space of real memory
virtual memory
48
this kind of memory is used to store information that may by used by a computer any time after it's written
data storage devices
49
the type of memory that will lose data quickly or when power is lost
volatile
50
an attack that freezes the memory chips to delay the decay of resident data when the system is turned off
cold boot attack
51
safeguards used to protect against emanation attakcs
TEMPEST
52
malicious code embedding itself into UEFI, BIOS, or firmware
phlashing
53
a single computer contains multiple processors that are threated equally and controlled by a single OS
symmetric multiprocessing (SMP)
53
a single computer contains multiple processors that are threated equally and controlled by a single OS
symmetric multiprocessing (SMP)
54
a computer having multiple processors that are operating independently of one another with its own OS, data bus, and memory resources
Asymmetric multiprocessing (AMP)
55
many AMP systems are linked together for computationally intensive tasks
massive parallel processing (MPP)
56
a form of parallel distributed processing that loosely groups a significant number of processing nodes into a grid
grid computing
57
what is the biggest security concern with grid computing?
grid computing projects are open to the world, so they are not able to maintain secrecy and protect private or proprietary data
58
networking and distributed application solutions that share tasks and workloads among peers
Peer-to-peer (P2P)
59
device that controls industrial processes and machines
industrial control system (ICS)
60
which committee is maintaining guidlelines for securing ICS?
ISA99 - integrated into the IEC
61
a collection of individual systems that work together to support a resource or provide a service
distributed system, distributed computing environment (DCE)
62
a collection or ledger of records, transactions, operations, or other events that are verified using hashing, timestamps, and transaction data. each time a new element is added the whole ledger is hashed again
blockchain
63
methods to secure DCE
homomorphic encryption MFA
63
methods to secure DCE
homomorphic encryption MFA
64
the concept that once information has been converted into a binary form and stored, it is subject to the laws of the country within which the storage device resides
data sovereignty
65
computing platforms designed to perform complex calculations at extremely high speeds
High performance computing (HPC)
66
data and the compute resources are located as close as possible in order to optimize bandwidth use while minimizing latency
edge computing
67
sensors, IoT devices, or edge devices collect data and transfer it back to a central location for processing. the processing location is in the LAN
fog computing
68
devices that offer a computational means to control something in the physical world
cyber-physical devices
69
the concept that a server never changes once it is deployed
immutable architecture
70
native or bare-metal hypervisor
type I
71
a hosted hypervisor
type II hypervisor
72
when an organization deploys numerous VMs without an orveraching IT management or security plan in place
VM sprawl
73
numerous underutilized servers are operating in the server room taking up space and electricity
server sprawl
74
eliminating the duplication of OS elements in a VM; each application is placed into a container that includes only the actual resources needed to support the enclosed application
containerization
75
the platform or server is managed by the cloud service provider (CSP)
serverless architecture
76
an attack in which attacker gains access to a system and makes small, random, changes to data during storage, processing, input, output or transaction rather than altering file contents
data diddling