Domain 3 - Security Architecture & Engineering Flashcards

1
Q

A major strength of this Encryption type is communication between parties previously unknown to eachother

A

Public Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define PKI Hierarchy of Trust Relationships

A

Trust = Permits combining asymmetric + symmetric cryptography to create a hybrid cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Asymmetric and Symmetric Encryption?

A

Asymmetric uses a key pair. One to encrypt/one to decrypt. It is also not identical on both sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shared Secret is _______ encryption

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a sender uses a shared key to encrypt and the receiver uses the same key to decrypt, what kind of algorithm is this?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The resource a user or process wants to access

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The user or process that makes a request to access a resource

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This Framework uses various levels of testing (EAL) and confirmation of a system’s security capabilities

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Developed to replace ITSEC

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

More flexible than TCSEC

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first attempt at establishing a single standard for evaluating security attributes of computer systems

A

ITSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gov’t Book that Addresses security evaluation topics for Networks and Network Components

A

Red Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? The Red Book states that subjects accessing objects on the network need to be Controlled, Monitored, and Audited?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software designers do this to restrict actions of a program. It allows a process to read from and write to only certain memory locations and resources.

A

Process Confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How could a program that writes to and reads from an area of memory that’s being used by another program violate the 3 tenets of security - CIA?

A

 Confidentiality
• I.e, if the data that’s processing was sensitive or secret, it’s confidentiality is no longer guaranteed
 Integrity
• I.e, if the data is overwritten or altered, there is no guarantee of integrity
 Availability
• If the data modification results in corruption or loss, it could become unavailable for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Limits being set on Memory Addresses and Resources is a process known as setting b_______.

17
Q

Bounds, similar to boundaries, state the area within which a p______ is confined or contained.

18
Q

Describe the difference between Logical Bounds and Physical Bounds

A

Logical - Segment logical areas of memory
Physical - Require every bounded process to run an in area of memory that is physically separated from other bounded processes

19
Q

When a process is confined through enforcing access bounds, that process runs in ________n.

20
Q

_____ _______ ensures that any behavior will affect only the memory and resources associated with the isolated process

A

Process Isolation

21
Q

Process Isolation is not required for preemtive multitasking, True or False?

A

False - Process Isolation is required for pre emptive multitasking

22
Q

A System that is Always secure no matter what state it is in

Security Models (Computer Architecture and Operating System Design)

A

State Machine Model

23
Q

Define a ‘State’ as it relates to the State Machine Model

A

A snapshot of a system at a specific Moment in Time

24
Q

Which Access Control uses Static Attributes of the Subject and Object

Access Controls - Access Rules

25
Compartmented (Top Secret) System High Mode Multilevel Mode (Secret, Top Secret, and Clearance) and Dedicated Mode are Security Modes in relation to which Access control?
MAC
26
With this Access Control, the Subject has some ability to define Objects to Access Access Control
DAC
27
Which Kernel makes up the main component of the TCB?
The Security Kernel
28
True or False? The TCB is made up of Hardware, Software, and Firmware
TRU
29
Which two Access Control Models Enforce Integrity?
Clark Wilson, Biba
30
Name a specific Military Access Control model that enforces Confidentiality
Bell-LaPadula
31
Does Clark Wilson use a Lattice or a 3 part relationship? Such as Subject/Transaction/Object
3 Part Relationship
32
True or False - in Clark-Wilson Subjects DO NOT have direct access to Objects? Objects can only be accessed through programs?
True; Objects can only be accessed through programs
33
Bell lapadula addresses confidentiality. True or false
TrUe Does not address integrity Keeps secret secret
34
P points down in bell lapadula because ____ down?
P reads down