Domain 3 set 5 Flashcards

(40 cards)

1
Q

Simple Integrity Property

A

No “read Down”

Biba Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biba Model two rules and Enforces what?

A
  1. Simple Integrity Property
      • Integrity Property

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
    • Integrity Property
A

No “Write Up”

Biba Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system design to operate at different security levels.

A

Multilevel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell-LaPadula Model two rules and Enforces what?

A
  1. Simple Security rule “No read up”
  2. *-Property Rules “No “write Down”

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two Evaluation Models

A
  1. TCSEC (Orange Book)

2. Common Criteria ( international Model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 Accreditation options?

A
  1. Authorization To Operate (ATO)
  2. Interim Authorization To Operate (IATO)
  3. Interim Authorization To Test
  4. Denial of Authorization To Operate (DATO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization To Operate good for how long

A

3 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interim Authorization To Operate (IATO) good for how long

A

6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accreditation is the same as?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type 1 Hypervisor is what?

A

barebone vm, data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type 2 Hypervisor is what?

A

vm on as application on the pc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VM escape attack is what?

A

when an attacker break out of the guest environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three Cloud models?

A
  1. Private Cloud
  2. Public Cloud
  3. Hybrid Cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The three type of public cloud service.

A

SaaS Software as a Service
PaaS Platform as a Service
LaaS Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LaaS the Customer is responsible for?

A

OS
Application
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PaaS the Customer is responsible for?

A

Data

Application

18
Q

SaaS the Customer is responsible for?

19
Q

Segmentation Fault

A

A error that occurs when an application requests unauthorized access to a memory segment

20
Q

What are the two types of Covert channels?

A
  1. Covert Storage Channel (ICMP echo request)

2. Covert Timing Channel ( Port Knocking)

21
Q

Raid 1

A

Disk mirroring ( 2 disk requested)

22
Q

Raid 5

A

Disk striping with parity ( 3 disk requested)

23
Q

Raid is what type of technique?

A

Fault tolerance not a backup strategy

24
Q

applets run on what?

A

on the client

25
Cache Poisoning Attacks
The insert of false records in local cache
26
two main Data Flow Control issues
1. controlling Bandwidth consumption | 2. Understanding sensitive data flows (use data-flow maps)
27
Two database Focused attacks?
Aggregation | Inference
28
aggregation is ?
when a multiple with low-level security clearance may be able to piece together sensitive information combining the facts available to them.
29
Use Key-value stores
No SQL
30
2 defined against SQL injections
1. input Validation | 2. Parameterized SQL
31
An Attacks occur when an attacker embeds malicious scripts in a third=party website.
(XSS) Cross-Site Scripting
32
What are the 4 names for a Cross-site request attacks
1. XSS 2. CSRF 3. XSRF 4. Sea Surf
33
3 types of ICS systems?
1. Supervisory control and data acquisition (SCADA) 2. Distributed control systems (DCS) 3. Programmable Logic Controllers (PLC)
34
What is an Embedded system?
An other word for Smart Devices
35
Best controls for Embedded system and mainframe?
Network segmentation and Application firewall
36
Class A Fires
Common Combustibles (Wood, cloth and trash)
37
Class B Fires
Flammable liguids (Gas and oil)
38
Class C Fires
Electrical Fires (data centers)
39
Class D Fires
Heavy Metal (industrial application)
40
Class K Fires
Kitchen fires (fats and cooking oils)