Domain 3 set 3 Flashcards

(32 cards)

1
Q

The Main stream Security Mode is ?

A

Clark-Wilson

NON-DOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the Down Data’s Dirty is what Security Mode?

A

BIBA Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Integrity Axiom means what?
A

NO Write UP

BIBA Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Processor Functions in What Ring?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Ring is the User Mode in?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Ring is the Privileged Mode in?

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 5 types of CPU executions?

A
  1. Multi programming (windows 3.1)
  2. Multitasking
  3. Multitheading
  4. Multiprocessing
  5. Multi-core processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Two types of Multitasking?

A

Cooperative

Preemptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cooperative Multitasking does not do what?

A

no isolation of the individual processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Very high speed memory used for storage by the CPU is called?

A

Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Execution or CPU Cycle is when?

A

The Control Unit and ALU performs the mathematical or logical operations on the DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used by the Processor to keep track of which instruction code have been processed and what ones will be processed next

A

Instruction Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CPU Fetch?

A

When the Control unit gets the instructions from the System Memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 4 CPU cycles?

A
  1. Fetch
  2. Decode
  3. Execute
  4. Store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCB ?

A

Trusted Computer BaseIt secures the cpu, memory, OS Kernel and Firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It Delineates the trusted and untrusted components within a computer system

A

Security Perimeter

*** It Isolates the TCB

17
Q

Isolates the Trusted Computer Base (TCB)?

A

Security Perimeter

18
Q

Security Kernel

A

The EnforcerEnforces the Reference Monitor Concept

19
Q

performs the mathematical or logical operations on the DATA it gets from memory

20
Q

What are the 3 Elements of the Trusted Computer Base (TCB)

A
  1. Security Perimeter
  2. Reference Monitor
  3. Security Kernel
21
Q

Is an Abstract Machine concept that mediate ALL access between SUBJECTS and OBJECTS

A

Reference MonitorTHE Rules

22
Q

Windows 10 Falls under what TCSEC Level

23
Q

the operation Mode that use a Reference Monitor to control Access?

24
Q

Operation Mode that enforces an AIRGAP

25
Which Security Feature prevents an Covert Channel?
NON Interference
26
Called the Orange Book
TCSECTrusted Computer System Evaluation Criteria
27
TCSEC
Trusted Computer System Evaluation Criteria
28
NO Read Down and No Write UP, is what Security Model?
BIBA Model
29
What Model uses ALPHA, BETA GAMMA
The Lattice-Based Access Controls
30
What security model does not prevent unauthorized alterations of High-Level Data?
Bell-Lapadula Model
31
NO READ UP and NO Write DOWN is what Security Model?
Bell-Lapadula Model
32
what Security Model protects Confidentialy?
Bell-Lapadula Model