Domain 3 -- Security Architecture and Engineering Flashcards
(318 cards)
The CPU is the _________ of a computer
brain
The actual execution of instructions and logic is performed by the _________.
Arithmetic Logic Unit (ALU)
The control unit _________ and ________ the system while different apps and operating system instructions are being executed
manages and synchonizes
What are the two types of registers that the CPU has?
General Registers
Special Registers
The Program Status Word (PSW) in the CPU has a bit to indicate _______ Mode or _______ Mode
User
Privlieged
What’s the difference between Symmetric and Asymmetric modes of multi-processing?
With Symmetric Multiprocessing any CPU can be handed any piece of work (example – All CPU’s can execute OS threads and user threads)
With Asymmetric multiprocessing, not all CPU’s are created equal. Some CPU’s can be dedicated to a specific task (e.g. the Operating System) and other CPU’s can be dedicated to user threads
What is ROM memory?
Read Only Memory – It can’t be changed
What is PROM and can it be changed?
PROM - Programmable Read-only memory (can be programmed only one time)
What is EPROM and can it be modified?
EPROM stands for Erasable Programmable Read Only Memory
It can be erased, modified and upgraded
It is erased with UV Light
What is EEPROM and how is it differrent from EPROM?
EEPROM stands for Electrically Erasable ROM.
Instead of requiring UV light to erase it. It can be erased elecrically.
Erasing EEPROM is slow. Only 1 bit at a time.
How are Flash Memory and EEPROM similar? How are they different?
Flash Memory came after EEPROM.
It can be erased in blocks and is faster than EEPROM
What are the three key elements that make a program vulnerable to a buffer overflow attack?
- Not validating the user input to perform proper bounds checking
- Making a function call that pushes the return pointer into the stack
- Using an insecure function that copies values without ensuring they do not exceed the size of the destination.
What are two memory Protection Techniques and how do they work?
- ASLR – Address Space Layout Randomization. This is where the OS changes the layout of the memory continually, so attackers can’t attack it
- DEP – Data Execution Prevention. It can mark certain memory locations as “off-limits” and thus reduce the “playing field for hackers.”
Where are the three places where memory leaks can take place?
- Operating Systems
- Applications
- Software drivers
What are the two main countermeasures against memory leaks?
- Developing better code that doesn’t create leaks
- Using garbage collector software to identify unused memory and mark it as available to the OS
Operating systems provide multiprogramming. What does that mean?
Multiprogramming means that more than one program (or process) can be loaded into memory at the same time.
Note that multi-programming is a legacy term. It has been replaced by multi-tasking.
What’s the difference between multi-programming and multi-tasking?
Multiproramming means the ability to load more than one program into memory at the same time.
Multitasking means the ability not only to load more than one program into memory at the same time, but also deal with requests from different applications simultaneously.
What’s the difference between cooperative multi-tasking and preemptive multitasking?
Cooperative multitasking (Windows 3.1 and early Mac systems) requrired processes to voluntarily release resources they were using while they were waiting.
With Preemptive multitasking the OS controls how long a process can control a resource via mechanisms like time sharing.
Pre-emptive multi-tasking took control away from the apps and gave it to the OS, making it more stable.
What are the three states that a process can be in?
Running
Ready
Blocked
What’s the difference between a maskable and non-maskable interrupt?
A maskable interrupt is assigned to an event that is not overly important. It can be ignored by the application, if necessary
A non-maskable interrupt can never be overriden by an application.
What is a watchdog timer?
A watchdog timer is an example of a critical process that must always do its thing.
The watchdog timer will reset the system with a warm reboot if it cannot recover itself
In what order are the instructions in the Memory Stack performed?
LIFO
What are the names of the two pointers related to the memory stack and what are they used for
Return pointer – where to send the results of processing after the instructions on the stack have been executed
Stack Pointer – used by the CPU to keep track of where it is in processing stack instructions
What are four methods of enforcing process isolation?
- Encapsulation of objects
- Time multiplexing of shared resources
- Naming distinctions
- Virtual memory mapping
