Domain 5: Security Architecture and Design Flashcards

1
Q

What is RAM?

A

RAM (Random Access Memory): Volatile hardware memory that loses integrity after loss of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is aReference Monitor?

A

Reference Monitor: Mediates all access between subjects and objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ROM?

A

ROM (Read Only Memory): Nonvolatile memory that maintains integrity after loss of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is TCSEC?

A

TCSEC (Trusted Computer System Evaluation Criteria): Known as the Orange Book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is TCB?

A

TCB (Trusted Computer Base): The security relevant portions of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Virtualization?

A

Virtualization: An interface between computer hardware and the operating system that allows multiple guest operating systems to run on one host computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two things that Security Architecture and Design describes?

A

1: fundamental logical hardware, operating system and software security components
2: How to use those components to design, architect and evaluate secure computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three Domain Parts to Security Architecture and Design describes?

A

1: Hardware and software required to have secure computer system
2: Logical models required to keep the computer secure
3: Evaluation models that quantify how secure a system really is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does

Secure System Design represent?

A

universal best practices; It transcends specific hardware and software implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is layering?

A

Separates hardware and software functionality into modular tiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What networking protocol isi similar to layering by profiding a similar function?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain how layeriing works when in your systej when you change disk drives from IDE to SCSI

A

Example: A disk drive in the hardware layer has changed from IDE to SCSI. The device drivers in the adjoining layer will also change but the other layers in the Operating System and the Application layers will remain unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the generic names for the four layers?

A

1: Hardware
2: kernel and device drivers
3: Operating System
4: Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is abstraction a good design principal?

A

Complexity is the enemy to security and computers are extremely complex machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why does abstraction provide the user?

A

Abstraction hides unnecessary detail from the user and provides a way to manage that complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the context of Secure System Design Concepts, Name two definitions for a a Securitiy Domain?

A

1: A list of objects a subject is allowed to access.
2: Groups of subjects and objects with similar security requirements like CONFIDENTIAL, SECRET and TOP Secret or User Mode and kernel Mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does kernel mode provide access to?

A

Allows low-level access to hardware (memory, CPU, disk, etc).

Most trusted and powerful part of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is another name for does kernel mode ?

A

Supervisor Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is The Ring Model?

A

A form of CPU layering that separates and protects domains from each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the four generic names to the the Ring Model layers?

A

Ring 0: Kernel

Ring 1: Other OS components that do not fit into Ring 0

Ring 2: Device Drivers

Ring3: User Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name for the process for communicting between layers in the Ring Model?

A

System Calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is one advantage and one disadvantage to System Calls?

A

System Calls are slow compared to inner ring communication but provide security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Practically, why do most X86 CPUs, including Linux and Windows, only use Ring 0 and Ring 3

A

because of performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What Ring Layer does a Hypervisor operate in?

A

Hypervisor (Ring 1)

Allows virtual guests to operate in Ring 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the difference beetween an Open and Closed System?
An open system uses open hardware and standards from a variety of vendors. A closed system uses proprietary hardware.
26
What is the difference beetween an Open system and Open Source?
An open system uses open hardware and standards from a variety of vendors. Open source makes source code publicly available.
27
What is the difference beetween The System Unit and the Motherboard?
System Unit: The case and all the internal electronic computer parts including the motherboard, disk drives, power supply, etc. Motherboard: hardware components like the CPU, memory slots, firmware, and peripheral slots
28
What is the purpose of The Computer Bus?
Primary communications channel between all components.
29
Some systems have two buses. What are thier names?
Northbridge & Southbridge: Two buses
30
What does each bus (Northbridge & Southbridge) propvide the communication channels for?
* *Northbridge** 1: Memory Controller Hub – MCH) 2: Connects CPU to RAM and Video Memory The Northbridge Bus is directly connected to the CPU and is faster than southbridge **Southbridge** 1: I/O Controller Hub – ICH) 2: Connects input/output devices.
31
What does the acronym MCH stand for?
Memory Controller Hub – MCH
32
What does the acronym ICH stand for?
I/O Controller Hub – ICH
33
What does the acronym CPU stand for?
Central Processing Unit
34
What is the difference between the Arithmetic Logic Unit (ALU) and Control Unit?
ALU performs mathematical calculations Control Unit feeds instructions to the ALU
35
What does the acronym ALU stand for?
Arithmetic Logic Unit
36
What is another name for Fetch & Execute? ## Footnote
Also called Fetch – Decode – Execute (FDX)
37
What does the acronym FDX stand for? ## Footnote
Fetch – Decode – Execute (FDX)
38
What are the generic four steps to the Fetch & Execute clock cycle? ## Footnote
1: Fetch Instruction 1 2: Decode Instruction 1 3: Execute Instruction 1 4: Write (save) Result
39
What is Pipelining? ## Footnote
Combines multiple steps into one process allowing simultaneous FDX and increasing throughput.
40
What is the pipeline depth?
The pipeline depth is the number of simultaneous stages which may be completed at once.
41
What is an Interrupt? ## Footnote
Indicate that an asynchronous event has occurred that causes the CPU from processing its current task, save the state, and begin processing a new request. When the new task is complete, the CPU will complete the prior task.
42
What is a Process? ## Footnote
An executable program and its associated data loaded and running in memory.
43
What is a Heavy Weight Process called? ## Footnote
(HWP) is called a task.
44
What is a Light Weight Process called? ## Footnote
LWP is called a thread
45
What does the acronym LWP stand for? ## Footnote
Light Weight Process
46
What does the acronym HWP stand for? ## Footnote
Heavy Weight Process
47
What is the differenece between Heavy Weight Processes and Light Weight Processes? ## Footnote
HWPs do not share memory while LWPs share memory resulting in low overhead.
48
What is a thread?
A Parent process may spawn child processes called Threads.
49
What is a zombie process?
A child process whose parent has terminated.
50
What are the five process states?
1: New: A process being created 2: Ready: Processes waiting to be executed by the CPU 3: Running: Processes being executed by the CPU 4: Blocked: Processes waiting for I/O 5: Terminated: Process that are complete.
51
What is Multitasking?
Multitasking: Allows multiple HWP (Heavy Weight Processes) to run simultaneously on one computer.
52
What is Multiprogramming?
Allows multiple programs to run simultaneously on one computer.
53
What is Multithreading?
Multithreading: Allows multiple LWP (Light Weight Processes - threads) to run simultaneously on one computer.
54
What is Multiprocessing?
Multiprocessing: Allows multiple processes to run simultaneously on multiple CPUs.
55
What is Symmetric Multiprocessing (SMP)?
Symmetric Multiprocessing (SMP): One operating system manages all CPUs.
56
What is Asymmetric Multiprocessing (ASMP or AMP)?
Asymmetric Multiprocessing (ASMP or AMP): One operating system essentially all independent systems.
57
Name the six types of "Multi" processing schemes:
1: Multitasking: Allows multiple HWP (Heavy Weight Processes) to run simultaneously on one computer. 2: Multiprogramming: Allows multiple programs to run simultaneously on one computer. 3: Multithreading: Allows multiple LWP (Light Weight Processes - threads) to run simultaneously on one computer. 4: Multiprocessing: Allows multiple processes to run simultaneously on multiple CPUs. 5: Symmetric Multiprocessing (SMP): One operating system manages all CPUs. 6: Asymmetric Multiprocessing (ASMP or AMP): One operating system essentially all independent systems.
58
What is a Watchdog Timer?
Watchdog Timer: Design to recover a system by rebooting after critical processes hang.
59
What is the difference between CISC and RISC architectures??
CISC (Complex Instruction Set Computer): Low-level commands are longer and powerful using less individual instructions to perform a complex task. RISC (Reduced Instruction Set Computer): Low-level commands are shorter and simpler using more individual instructions to perform a complex task but allowing less cycles per instruction and more efficient code.
60
What does the acronym CISC stand for?
CISC (Complex Instruction Set Computer): Low-level commands are longer and powerful using less individual instructions to perform a complex task.
61
What does the acronym RISC stand for?
RISC (Reduced Instruction Set Computer): Low-level commands are shorter and simpler using more individual instructions to perform a complex task but allowing less cycles per instruction and more efficient code.
62
Which architecture is best: RISC or CISC?
No correct answer CISC used in x86 CPUs RISC used in smart phones, powerPCs, SPARC
63
Which architecture is best: RISC or CISC?
No correct answer CISC used in x86 CPUs RISC used in smart phones, powerPCs, SPARC
64
What does the acronym RAM stand for?
Random Access memory
65
Is RAM volatile?
Yes but some RAM has remanence for seconds or minutes after loss.
66
What os Sequential memory?
Like a tape, must sequentially read memory.
67
What is memory Volatility?
Like RAM, loses integrity after power loss.
68
What is memory Nonvolatility?
Like ROM, Disk or tape, does not lose integrity after power loss.
69
What does the acronym ROM stand for?
ROM (Read Only Memory).
70
What is the main difference between ROM and RAM?
ROM is Nonvolatile while RAM is volatile.
71
Can you overwrite ROM?
Yes - Some types of ROM may be overwritten in a process called flashing
72
What is Real or Primary Memory?
Real or Primary: Like RAM, directly accessible by the CPU and is used to hold data and instructions for currently running processes.
73
What is Secondary Memory?
Secondary: Like disks, is not directly accessible.
74
What is Cache?
Fastest memory on the system, the data most frequently used by the CPU.
75
Name the five types of cache in order of speed.
1: Register File: The fastest portion of the cache, small storage locations used to store instructions and data. 2: Level 1: Next Fastest, Located on the CPU. 3: Level 2: Next Fastest, connected to the CPU but Located outside. 4: SRAM (Static Random Access Memory): Expensive and Fast, uses small latches called flip-flops to store bits. 5: DRAM (Dynamic Random Access memory):: Stores bits in small capacitors (like batteries) and is slower and cheaper than SRAM.
76
In regards to cache, what is a Register File?
Register File: The fastest portion of the cache, small storage locations used to store instructions and data.
77
In regards to cache, what is Level 1 cache?
Reallyy fast memory Located on the CPU.
78
In regards to cache, what is Level 2 cache?
Reallyy fast memory Located outside the CPU but directly connected.
79
In regards to cache, what is SRAM?
SRAM (Static Random Access Memory): Expensive and Fast, uses small latches called flip-flops to store bits.
80
What does the acronym SRAM stand for?
SRAM (Static Random Access Memory):
81
What does the acronym DRAM stand for?
Dynamic Random Access memory
82
What does the acronym DRAM stand for?
Dynamic Random Access memory
83
In regards to cache, what is DRAM memory?
Stores bits in small capacitors (like batteries) and is slower and cheaper than SRAM. Leak charge and must be refreshed
84
What is the difference between asynchronous and synchronous SRAM?
Synchronous SRAM is designed to exactly match the speed of the CPU, while asynchronous is not. That little bit of timing makes a difference in performance. Matching the CPU's clock speed is a good thing, so always look for synchronized SRAM.
85
What is the General Rule cache and location to the CPU?
General Rule: the closer memory is to the CPU, the faster and more expensive it is. As you move away from the CPU (SRAM, DRAM to Disk, tape, etc) it becomes slower and less expensive.
86
In terms of Memory Addressing, what is Direct Addressing?
The CPU adds the values stored here (at this memory location).
87
In terms of Memory Addressing, what is Indirect Addressing?
Indirect Addressing (**Pointer**): The CPU adds the **value** stored in memory location here.
88
In terms of Memory Addressing, what is Register Direct Addressing?
The same as Direct Addressing except that it references a CPU register.
89
In terms of Memory Addressing, what is Register Indirect Addressing?
The same as InDirect Addressing except the pointer is stored in the register.
90
What is Memory Proteection?
Prevents one process from affecting the CIA of other processes.
91
What is Memory design requirement for secure multiuser and multitasking systems.
Memory Protection
92
In terms of Memory Protection, What is Process Isolation?
A logical control that attempts to prevent one process from interfering with another.
93
In terms of Memory Protection, Why is Process Isolation important?
A lack of process isolation means that one process crash could crash the entire operating system or that an attacker could affect the CIA of any transaction
94
In terms of Memory Protection, What is an Interference attack?
Interference attacks are CIA attacks on process isolation.
95
In terms of Memory Protection, what is one exampleof an interferenceattack for each element of CIA?
**Confidentiality**: read your credit card number during an online purchase. **Integrity**: Change your credit card number during an online purchase **Availability**: Stopping an online purchase
96
In terms of Memory Protection, what are the four techniques used to provide process isolation
1: Virtual memory 2: Object Encapsulation 3: Time Multiplexing 4: Hardware Segmentation
97
In terms of Memory Protection, how does **Virtual Memory** provide Process Isolation?
Provides virtual address mapping between applications and hardware memory. where process A's address space is different from process B's address space - preventing A to write into B.
98
In terms of Memory Protection, Is the function of **Virtual Memory** only Process Isolation?
No - it has Multiple Functions: 1: Multitasking (multiple tasks on one CPU) 2: Shared library for multiple processes 3: Swapping
99
What are the three functions of **Virtual Memory**?
1: Multitasking (multiple tasks on one CPU) 2: Shared library for multiple processes 3: Swapping
100
Is **Virtual Memory** = Swapping?
No - it has three functions: 1: Multitasking (multiple tasks on one CPU) 2: Shared library for multiple processes 3: Swapping
101
In terms of Virtual Memory, What is paging?
Paging: Copies blocks of memory between RAM and secondary memory.
102
In terms of Virtual Memory, What is swap space?
Swap space is often a dedicated partition on the hard drive and is used to extend the amount of available memory.
103
In terms of Virtual Memory, What is a page fault?
If the kernel attempts to access a page (fixed-length block of memory) located in swap space, a page fault occurs telling the computer to swap the page from the Swap Space into RAM.
104
In terms of Virtual Memory, What is a swapping designed to do?
Designed as a protective measure to handle occasional bursts of memory usage.
105
In terms of Virtual Memory, What is the generic process for swapping?
1: Computers keep filling RAM until almost filled. 2: The system will Swap idle processes to Swap Space. 3: As both RAM and Swap Space fills up, the system will start thrashing by swapping active processes to Swap space.
106
In terms of Virtual Memory, What is thrashing?
As both RAM and Swap Space fills up, the system will start thrashing by swapping active processes to Swap space.
107
In terms of Virtual Memory, What is are two mitigations to thrashing?
1: Add more memory 2: Remove processes
108
In terms of Virtual Memory, What is firmare?
Stores small programs that do not change that often in ROM.
109
In terms of Virtual Memory, What are the three types of firmare?
1: PROM (Programmable Read Only Memory): Can be written once typically at the factory. 2: EPROMS (Erasable Programmable Read Only Memory): 3: EEPROMS (Electrically Erasable Programmable Read Only Memory):
110
In terms of Virtual Memory and firmware What is a PROM?
PROM (Programmable Read Only Memory): Can be written once typically at the factory.
111
In terms of Virtual Memory and firmware What is a EPROM?
Erasable Programmable Read Only Memory that May be flashed or erased or written many times.
112
In terms of Virtual Memory and firmware Where did the term Flashing come from?
Flashing derived from EPROMs because they were erased by flashing ultraviolet light onto a small window on the chip.
113
In terms of Virtual Memory and firmware What is Flashing?
Flashing is the process of erasing and re-writing EPROMs.
114
In terms of Virtual Memory and firmware What is an EEPROM?
EEPROMS (Electrically Erasable Programmable Read Only Memory): May be flashed or erased or written many times
115
In terms of Virtual Memory and firmware What is the difference between a EPROM and an EEPROM?
EEPROMS are a Modern type of ROM, electrically erasable via flashing programs. Any byte of a EEPROM can be overwritten.
116
In terms of Virtual Memory and firmware What is the difference between a EPROM and an EEPROM?
EPROMs can be flashed but it is all or nothing. EEPROMS are a Modern type of ROM, electrically erasable via flashing programs. Any byte of a EEPROM can be overwritten.
117
In terms of Virtual Memory and firmware What is Programmable Logic Device (PLD):
Programmable Logic Device (PLD) are programmed after it leaves the factory.
118
In terms of Virtual Memory and firmware Name three types of Programmable Logic Devices (PLDs)
1: EPROMS 2: EEPROMS 3: Flash memory are all PLDs.
119
In terms of Virtual Memory and firmware What is the issue with destroying firmware as compared to other electronics?
Chip-based media is not like magnetic disks; Degausers may not work.
120
In terms of Virtual Memory and firmware What does the acronym BIOS stand for?
Basic Input Output System
121
In terms of Virtual Memory and firmware What is a BIOS?
Code in firmware that is executed when the PC is turned on,
122
In terms of Virtual Memory and firmware What does the acronym WORM stand for?
WORM (Write Once Read Many) Storage
123
In terms of Virtual Memory and firmware What is the advantage WORM memory?
Insures Integrity because there is some assurance that the data cannot be modified.
124
In terms of Virtual Memory and firmware Name three types of WORM memory?
1: CD-R: Compact Disc Recordable 2: DVD-R: Digital Versatile Disk Recordable 3: Some Digital Linear Tape (DLT) drives and media
125
In terms of Virtual Memory and firmware Name two types memory that are often confused as WORM memory but are not?
1: CD-RW 2: DVD-RW
126
What is Secure Operating System and Software Architecture
Provides a secure interface between the hardware and application layers.
127
What does an operating system do?
Operating systems provide memory, resource and process management.
128
What does the kernel do?
Provides interface between the Operating System and the hardware.
129
What ring number does the kernel operate at?
Usually runs at Ring 0
130
What are two kernel designs?
1: Monolithic 2: Microkernel
131
how does a monolithic kernel design work?
Monolithic: compiled into one static executable and runs in supervisor mode.
132
How does a Microkernel kernel design work?
Microkernel: Modular kernels; smaller, less native functionality compared to Monolithic kernels. Can add new functionality via loadable kernel modules. May run modules at User Level – Ring 3
133
What does a Reference Monitor do?
Mediates access between subjects and objects.
134
How does a Reference Monitor work?
Enforces system security policy like restricting SECRET subjects from accessing TOP SECRET objects
135
What is a key design principla for a Reference Monitor ?
Always enabled and cannot be bypasses
136
Can you evaluate the security of the reference monitor?
Secure systems can evaluate the security of the reference monitor.
137
What is the difference between UNIX/LINUX and Windows User and File Permisisons?
Both LINUX/UNIX and Windows Operating systems usually grant read, write and execute permissions. Windows has more: Modify and full control.
138
What is a Privileged Program?
Normal users can’t edit the system files like the password file but they need to be able to change their password.
139
What is the Unix setuid programs for?
In Unix, setuid programs let normal users run Privileged Programsas as the file’s owner. Setgid runs with the permission’s of the file’s group.
140
What is virtualization?
Adds a software layer between an operating system and the underlying computer hardware. Allows multiple guest operating systems to run simultaneously on one physical host.
141
What are types of virtualization?
1: Transparent 2: Paravirtualization
142
What is Transparent virtualization?
runs stock operating systems
143
What is Paravirtualization ?
runs specially modified operating systems with modified kernel system calls.
144
Name one advantage and one disadvantage to Paravirtualization ?
Advantage:Can be more efficient Disadvantage: Requires changing the guest operating systems; may not be possible for closed systems like windows.
145
Name four advantages virtualization ?
1: Lower hardware costs by consolidation and lower power and cooling requirements 2: Snapshots allows admins to create OS images that can be restore at the click of a mouse. 3: Testing becomes simple 4: Clustering virtual guests is easier than clustering Operating Systems directly on hardware.
146
Name three security issues with virtualization ?
1: Technology complex and relatively new. 2: It is not a replacement for a firewall; never combine guests with different security requirements (like a DMZ and an Internal Box) 3: Risk of virtualization escape is of high interest to the research community
147
What is a Thin Client?
Runs on a full operating system but uses a web browser as a universal client.
148
Name four advantages to Thin Clients?
1: Simplify client server architecture and design 2: Improve Performance 3: Lower costs 4: All data is stored on servers
149
Name two security issues with Thin Clients?
1: Client must patch the browser and operating system for security. 2: Applications are patched in the server.
150
In terms of System Vulnerabilities, Threats and Countermeasures What is an Emanation?
Energy that escapes electronic systems.
151
In terms of System Vulnerabilities, Threats and Countermeasures What is TEMPEST?
A codename by the US NSA for a standard for shielding emanations
152
In terms of System Vulnerabilities, Threats and Countermeasures What is a Covert Channels?
Any communications that violates security policy
153
In terms of System Vulnerabilities, Threats and Countermeasures Name Two Types of Covert Channels?
1: Storage Channels: The storage of an item has some secret meeting that has nothing to do with the item itself. 2: Timing Channels: The response times to various scenarios may indicate unintended information.
154
In terms of Covert Channels, What is a Storage Channel?
Storage Channels: The storage of an item has some secret meeting that has nothing to do with the item itself.
155
In terms of Covert Channels, What is a Timing Channelsl?
Timing Channels: The response times to various scenarios may indicate unintended information.
156
In terms of Covert Channels, What is the opposite of a Covert Channel?
The opposite of a Covert Channel is a Overt Channel; authorized communications that complies with policy.
157
In terms of System Vulnerabilities, Threats and Countermeasures, What is a Buffer Overflow?
Occur when a programmer fails to perform boundary checking.
158
In terms of System Vulnerabilities, Threats and Countermeasures, What is Smashing the Stack?
Another name for Buffer Overflow, Smashing the Stack is what an attacker does when he tries to insert information into a variable that is much larger than the programmer intended.
159
In terms of System Vulnerabilities, Threats and Countermeasures, How do you mitigate Buffer Overflows?
Mitigated by secure application development.
160
In terms of System Vulnerabilities, Threats and Countermeasures, What does the acronym TOCTOU stand for?
TOCTOU: Time of Check / Time of Use Race Conditions
161
In terms of System Vulnerabilities, Threats and Countermeasures, What is a race condition?
A race condition is when an attacker attempts to alter a condition after it has been checked by the operating system but before it is used.
162
In terms of System Vulnerabilities, Threats and Countermeasures, What is a Backdoor?
Shortcut in the system that allows a user to bypass security controls.
163
In terms of System Vulnerabilities, Threats and Countermeasures, How do attackers install Backdoors?
Attackers will often install a backdoor once they compromise a system.
164
In terms of System Vulnerabilities, Threats and Countermeasures, Are there legitimate Backdoors?
Yes- Maintenance hooks are a type of backdoor; shortcuts installed by system designers to allow developers to bypass security during development.
165
In terms of System Vulnerabilities, Threats and Countermeasures, What is Malicious Code?
Generic term for any type of software that attacks an application or system.
166
In terms of System Vulnerabilities, Threats and Countermeasures, What are four types Malicious Code?
1: Viruses 2: Worms 3: Trojans 4: Logic bombs
167
In terms of Malicious Code, What is a virus?
Malcode that does not spread automatically; they require a carrier like a USB drive or floppy disk.
168
In terms of Malicious Code, Name five types of viruses?
1: Macro Virus: written in a macro language like MS Office. 2: Boot Sector Virus: Installs itself in the boot sector of the hard drive ensuring that the virus loads every time the system is started. 3: Stealth Virus: Hides itself from the OS and AV systems. 4: Polymorphic Virus: a virus that changes its signature upon infection to evade AV 5: Multipartite Virus (Multipart): spreads via multiple vectors
169
In terms of Malicious Code viruses, What is Macro Virus?
Macro Virus: written in a macro language like MS Office.
170
In terms of Malicious Code viruses, What is a Boot Sector Virus?
Boot Sector Virus: Installs itself in the boot sector of the hard drive ensuring that the virus loads every time the system is started.
171
In terms of Malicious Code viruses, What is a Stealth Virus?
Stealth Virus: Hides itself from the OS and AV systems.
172
In terms of Malicious Code viruses, What is a Polymorphic Virus?
Polymorphic Virus: a virus that changes its signature upon infection to evade AV
173
In terms of Malicious Code viruses, What is a Multipartite Virus ?
Multipartite Virus (Multipart): spreads via multiple vectors
174
In terms of Malicious Code, What is a Worm?
Malware that self-propagates. Coined by John Brunner in 1975’s “The Shockwave Rider”
175
In terms of Malicious Code, Name two ways that a Worm casues damage.
Cause damage in two ways: 1: with the malicious code they carry and 2: Also with the generated network traffic from aggressive worms self-propagation.
176
In terms of Malicious Code, What was the first First Widespread Worm?
First Widespread Worm: Morris Worm of 1988.
177
In terms of Malicious Code, What is a Trojan?
Also called a Trojan Horse (derived from Virgil’s poem “ The Aeneid”) Performs two functions; one benign (like a game) and the other, the Malcode.
178
In terms of Malicious Code, What is a Logic bomb?
Malicious code triggered when a logical condition is met. Malcode often contain logic bombs that behave one way until a specific condition is met and then completely change tactics.
179
In terms of Malicious Code, What is a Zero day exploit?
A Zero day exploit is Malcode for which there is no vendor-supplied patch.?
180
In terms of Malicious Code, What is a Root Kit?
Malware that replaces portions of the kernel and/or operating system.
181
In terms of Malicious Code, What does a user-mode (Ring 3) Root Kit do?
A user-mode (Ring 3) rootkit replaces operating system components like ls or ps.
182
In terms of Malicious Code, What does kernel mode (Ring 0) Root Kit do?
A kernel mode (Ring 0) rootkit replaces kernel modules.
183
In terms of Malicious Code, What does a Packer do?
Provide runtime compression of executable.
184
In terms of Malicious Code, How does Runtime compression (Packers) work?
Runtime compression works by compressing the original executable and appending a small decompresser the now compressed exe. Upon execution, the decompresser unpacks the original exe and executes it.
185
In terms of Malicious Code, Are Packers malcode?
No- Neutral technology; not malicious code per se. but attackers use the technology to avoid AV detection.
186
In terms of Malicious Code, What is Anti Virus?
Software that is designed to prevent and detect Malicious Code
187
In terms of Malicious Code, Name two types of Anti Virus?
1: Signature-based av uses static signatures of known malware 2: Heuristic-based av uses anomaly-based detection
188
In terms of Malicious Code, What is Signature-based AV ?
Signature-based av uses static signatures of known malware
189
In terms of Malicious Code, What is Heuristic-based AV ?
Heuristic-based av uses anomaly-based detection
190
In terms of System Vulnerabilities, Threats and Countermeasures, What is a Server Side Attacks (Service Side Attacks)?
Launched by an attacker at a listening service. Exploit vulnerabilities in installed services but this is not exclusively a server problem.
191
In terms of System Vulnerabilities, Threats and Countermeasures, Name three mitigations for Server Side Attacks (Service Side Attacks)?
1: Patching 2: Firewalls 3: Other Defense in Depth measures
192
In terms of System Vulnerabilities, Threats and Countermeasures, What is a Client Side Attack?
Launched when a user downloads malicious content; initiated from the victim The flow of data is reversed compared to server-side.
193
In terms of System Vulnerabilities, Threats and Countermeasures, What is the main differnece between a Client Side Attack and a server side attack?
Client Side Attacks are initiated from the victim. The flow of data is reversed compared to server-side. Server side attacks are Launched by an attacker at a listening service.
194
In terms of System Vulnerabilities, Threats and Countermeasures, Name three mitigations for Client Side Attacks?
1: Patching but more difficult than server side attacks 2: Firewalls but more difficult; designed to restrict inbound traffic, not outbound. 3: Other Defense in Depth measures
195
In terms of System Vulnerabilities, Threats and Countermeasures, Why do attackers leverage Web Application Attacks?
Web 2.0 technology presents dynamic content and has increased the attack surface. Dynamic Web languages like PHP (Recursive name that stands for Hypertext Processor) enables web pages to be more dynamic.
196
In terms of System Vulnerabilities, Threats and Countermeasures, What is one example of a Web Application Attack?
Example: remote file inclusion attack
197
In terms of System Vulnerabilities, Threats and Countermeasures, What is XML (Extensible Markup Language)?
Like HTML, a standard to encode documents and data but more universal. Users can define their own formats.
198
In terms of System Vulnerabilities, Threats and Countermeasures, What is Security Assertion Markup Language (SAML?
Security Assertion Markup Language (SAML) is an XML-based framework for exchanging security information including authentication data. Some forms of Single-Sign-On use SAML to exchange data.
199
In terms of System Vulnerabilities, Threats and Countermeasures, What is Security Assertion Markup Language (SAML?
Security Assertion Markup Language (SAML) is an XML-based framework for exchanging security information including authentication data. Some forms of Single-Sign-On use SAML to exchange data.
200
In terms of System Vulnerabilities, Threats and Countermeasures, What is an applet?
Small pieces of mobile code that are embedded in other software like browsers.
201
In terms of System Vulnerabilities, Threats and Countermeasures, What is the difference between an applet and XML/HTML?
Unlike HTML and XML, applets are executables downloaded from servers and run locally.
202
In terms of System Vulnerabilities, Threats and Countermeasures, Name two languages that attackers write malicious applets in.
Malicious Applets are like Malicious Code Can be written in a variety of languages: Java and ActiveX
203
In terms of System Vulnerabilities, Threats and Countermeasures, What is JAVA?
An Object Oriented programming langauage used to build Applets and general purpose programming
204
In terms of System Vulnerabilities, Threats and Countermeasures, What is a unique design feature to the JAVA programming language?
Java bytecode is platform independent. It is interpreted by the Java Virtual Machine (JVM) available for a variety of Operating Systems.
205
In terms of System Vulnerabilities, Threats and Countermeasures, What is a security feature of JAVA?
Run in a sandbox that segregates the code from the OS. Designed to prevent the attacker that compromises an Applet from gaining access to the Operating System.
206
In terms of System Vulnerabilities, Threats and Countermeasures, What is a security feature of Sandbox technology?
Code that runs in a sandbox must be self-sufficient meaning that it cannot rely on the Operating system to function.
207
In terms of sandbox technologhy, What is a Trusted Shell?
Trusted Shell is a statically compiled shell which can be used in sandboxes. It does not rely on the OS shared libraries.
208
In terms of System Vulnerabilities, Threats and Countermeasures, Why do security people say that JAVA is insecure?
Java has two parts: the runtime that runs on your computer (and lets you run Java apps), and the browser plug-in that comes along with it. When people talk about Java being insecure, they're talking about the browser plug-in. Java apps themselves aren't inherently insecure, it's the browser plug-in that causes problems.
209
In terms of System Vulnerabilities, Threats and Countermeasures, What is Active X?
ActiveX is a software component of Microsoft Windows. ActiveX controls are small programs, sometimes called add-ons that are used on the Internet.
210
In terms of System Vulnerabilities, Threats and Countermeasures, What is the security design feature of Active X?
ActiveX uses digital certificates instead of sandboxes to provide security.
211
In terms of System Vulnerabilities, Threats and Countermeasures, What is a Mobile Device Attack?
Range from USB flash drives to Laptops. Infected with Malware outside the perimeter and then carried into an organization.
212
In terms of System Vulnerabilities, Threats and Countermeasures, Name two Admin contorls to mitigate Mobile Device Attack?
Admin Controls like 1: Policy preventing or 2: limiting use.
213
In terms of System Vulnerabilities, Threats and Countermeasures, Name six Technical contorls to mitigate Mobile Device Attack?
Technical control like 1: preventing USB devices rom functioning. 2: Authentication via OSI Layer 2 802.1X 3: Patch Verification 4: Up to Date AV signatures 5: Network Access Control (NAC): Device based solution supported by vendors 6: Network Access Protection (NAP): OS solution supported by MS.
214
In terms of Database Security, What is Polyinstantiation?
Allows two different objects to have the same name; means that two rows may have the same primary key but will have different data.
215
In terms of Database Security, Why is Polyinstantiation needed?
Databases normally require rows to contain a unique primary key. The multi-level secure database cannot do that without allowing the manager to infer Top Secret Information. Means that the database will create a row with a duplicate key: one labeled SECRET and one Labeled TOP SECRET.
216
In terms of Database Security, What is Inference and Aggregation?
Occurs when a user is able to use lower level access to learn restricted information.
217
In terms of Database Security, What is Inference ?
Inference requires deduction; lower level details provide clues
218
In terms of Database Security, What is Aggregation ?
Aggregation is a mathematical process; a user asks every question and receives every answer deriving restricted information
219
In terms of Database Security, What is the mitgation to Inference and Aggregation ?
Mitigation: Polyinstantiation
220
In terms of Database Security, What is Data Mining?
Searching large amounts of data to determine patterns that would otherwise get lost in the noise.
221
In terms of Database Security, What is a mitigation to Data Mining?
Defense in Depth
222
In terms of Security Models, What is a the difference between writing up and Reading Down?
Reading Down occurs when a subject reads an object at a lower security level Writing Up occurs when a subject passes an object at a higher security level; the subject does not see any of the information in the object. The difference between Reading Down and Writing Up is the direction flow.
223
In terms of Security Models, Writing Up protects which elements of CIA at the expense of what others?
Protects Confidentiality at the expense of integrity. The subject passes the object to a higher security level without reading it. The subject does not read it (Confidentiality) but does not know if the information is valid (Integrity).
224
In terms of Security Models, What is a State Machine Model?
A State Machine is a mathematical model that groups all possible occurrences called states. If every state is proven to be secure, then the system is secure.
225
In terms of Security Models, What is the Bell-LaPadula Model (State Machine)?
It is probably better known as the “no read up, no write down” model. It uses a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from Unclassified, For Official Use Only, Confidential, Secret, Top Secret, etc.
226
In terms of Security Models, What is the limitation of the Bell-LaPadula Model (State Machine)?
The model, however, has no clear distinction of protection and security.
227
In terms of Security Models, How does the Bell-LaPadula Model (State Machine) work?
The model emphasizes data confidentiality and controlled access to classified information. To control access to this information the clearance of the subject is compared to the classification of the objects in order for the subject to be granted access to the object.
228
In terms of Security Models, What are the Two mandatory access control rules for the Bell-LaPadula Model (State Machine)?
Simple Security Policy – A subject at a given security level may not read an object at a higher security level. The subject may not “read up”. For example, a person with a Secret clearance level may not read a report that is labeled with Top Secret. The \*-property or Confinement property – A subject at a given security level may not write to any object with a lower security level. The subject may not “write down”. Note: Trusted subjects are not restricted by this property.
229
In terms of Security Models, What is the Simple Security Policy in the Bell-LaPadula Model (State Machine)?
Simple Security Policy – A subject at a given security level may not read an object at a higher security level. The subject may not “read up”. For example, a person with a Secret clearance level may not read a report that is labeled with Top Secret.
230
In terms of Security Models, What is The \*-property or Confinement property in the Bell-LaPadula Model (State Machine)?
A subject at a given security level may not write to any object with a lower security level. The subject may not “write down”. Note: Trusted subjects are not restricted by this property.
231
In terms of Security Models, What is Lattice-Based Access Controls (State Machine) model?
Allows security controls for complex environments. Allows subjects to reach higher and lower security classifications.
232
In terms of Security Models, What is the main design principla for the Lattice-Based Access Controls (State Machine) model?
For every relationship between subject ad object, there are defined upper and lower access limits by the system.
233
In terms of Security Models, What are the three dependencies in the Lattice-Based Access Controls (State Machine) model?
Depends on three things: 1: The Subject’s Need 2: The Object’s Label 3: The Subject’s Role
234
In terms of Security Models, What are the two propertiess in the Lattice-Based Access Controls (State Machine) model?
1: Least Upper Bound (LUB) 2: Greatest Lower Bound (GLB)
235
In terms of Security Models, What is the Biba Model(State Machine)?
The Biba Model also carries a clever catch phrase: “no read down, no write up”. The Biba model addresses integrity which was missing in the confidentiality focused Bell-La Padula model. Much like the Bell-La Padula model, the Biba model uses objects and subjects. However, objects and subjects are grouped into integrity levels instead of given security labels.
236
In terms of Security Models, How does the Biba Model(State Machine) preserve integrity?
In order to preserve integrity, subjects may create content at or below their own integrity level and view content at or above their own integrity level. This helps to prevent data corruption thus preserving integrity.
237
In terms of Security Models, What are the two security rules associated with the Biba Model(State Machine)?
1: Simple Integrity Axiom: A subject at a given level of integrity must not read an object at a lower integrity level (no read down). 2: (star) Integrity Axiom: A subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).
238
In terms of Security Models, What is the Simple Integrity Axiom in the Biba Model(State Machine)?
Simple Integrity Axiom: A subject at a given level of integrity must not read an object at a lower integrity level (no read down).
239
In terms of Security Models, What is the \* (star) Integrity Axiom in the Biba Model(State Machine)?
A subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).
240
In terms of Security Models, What is the Clark-Wilson (State Machine) model?
The Clark-Wilson model is concerned with information integrity using an integrity policy that defines enforcement rules (E) and certification rules (C).
241
In terms of Security Models, What is the basic principal of the Clark-Wilson (State Machine) model?
The basic principle of the model revolves around the idea of a transaction which is a series of operations. The model essentially boils down to data items and processes that operate on these data items
242
In terms of Security Models, What is a A Constrained Data Item (CDI) in the Clark-Wilson (State Machine) model?
A Constrained Data Item (CDI) is considered the key data item in the model.
243
In terms of Security Models, What is a Integrity Verification Procedure (IVP) in the Clark-Wilson (State Machine) model?
An Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid.
244
In terms of Security Models, What is a Transformation Procedures (TPs) in the Clark-Wilson (State Machine) model?
Transformation Procedures (TPs) are the transactions that enforce the integrity policy. A Transformation Procedure takes as input a Constrained Data Item or Unconstrained Data Item (UDI) (possible system input from users) and produces a Constrained Data Item. A Transformation Procedure must transition the system from one valid state to another valid state via certification.
245
In terms of Security Models, What is a The Clark-Wilson triple in the Clark-Wilson (State Machine) model?
The Clark-Wilson triple is the relationship that exists between the components of an authenticated principal, a set of programs (Transformation Procedures), and data items (Constrained Data Items and Unconstrained Data Items).
246
In terms of Security Models, What two concepts does the Clark-Wilson (State Machine) model enforce?
1: Separation of duties 2: Transformation procedures within the system
247
In terms of Security Models, What is the Chinese Wall Model (Brewer-Nash) (State Model)?
Initially designed to address the risks inherent with employing consultants to work on financial systems Generally designed to avoid conflicts of interest by prohibiting one person from accessing multiple Conflict of Interest Categories (COI).
248
In termsof the Chinese Wall Model (Brewer-Nash) (State Model) what do COIs pertain to?
COIs (Conflict of Interest Categories) pertain to accessing company-sensitive information from different companies that are in direct competition with one another.
249
In terms of Conflict of Interest Categories what is the main design issue for COIs in the Chinese Wall Model (Brewer-Nash) (State Model)?
Requires that COIs be identified so that one consultant gains access to one COI, they cannot access opposing COIs.
250
In terms of Security Models what is the Noninterference Model (State Model)?
Ensures that data from different security domains remain separate.
251
In terms of Security Models what does the Noninterference Model (State Model) control against?
Controls against covert channel communications because the information cannot cross boundaries
252
In terms of Security Models what is the main design principal to the Noninterference Model (State Model)?
Each data access attempt is independent and has no connection to previous data access attempts.
253
In terms of Security Models what is the Take-Grant Model (State Model)?
Refers to rules that govern interactions between subjects and objects
254
In terms of Security Models what are the four general rules in the Take-Grant Model (State Model)?
1: Create Privileges: (Alice Creates Privileges for Docs) 2: Remove Privileges: (Alice Removes Privileges for Docs) 3: Grant Privileges: (Alice Grants Privileges to Carol) 4: Take Privileges: (Bob Takes Privileges from Alice)
255
In terms of Security Models what is the Access Control Matrix Model (State Model)?
A Table that defines what access permissions exist between subjects and objects. A data structure that acts as a lookup table for the Operating System
256
In terms of Security Models what are the six frameworks for information security in the Zachman Framework for Enterprise Architecture?
Provides six frameworks for providing information security. 1: Who 2: What 3: When 4: Where 5: Why 6: How
257
In terms of Security Models what are the three parts to the Graham-Denning Model (State Model)?
1: Objects 2: Subjects 3: Rules
258
In terms of Security Models what are the 8 rules to the Graham-Denning Model (State Model)?
R1: Transfer Access R2: Grant Access R3: Delete Access R4: read Object R5: Create Object R6: destroy Object R7: Create Subject R8: Destroy Subject
259
In terms of Security Models what is the Harrison-Ruzzo Model (State Model)
Maps subjects, objects and access rights to an access matrix.
260
In terms of Security Models what is the difference between the Harrison-Ruzzo Model (State Model) and the Graham-Denning Model?
A variation of the Graham-Denning Model; different in that it considers subjects to be objects.
261
In terms of Security Models what iare the six primitives to the Harrison-Ruzzo Model (State Model)
1: Create Object 2: Create Subject 3: Destroy Subject 4: Destroy Object 5: Enter Right into Access Matrix 6: Delete Right from Access matrix
262
In terms of Conflict of Interest Categories what are the four **Modes of Operaiton**?
1: Dedicated: 2: System high 3: Compartmented 4: Multilevel
263
In terms Conflict of Interest Categories In the four **Modes of Operaiton,** what does **Dedicated** mean?
Contains objects of one classification only. All subjects must have equal clearance or higher: Appropriate Clearance Formal access approval Kneed to Know
264
In terms of Security Models what are the three parts to the Graham-Denning Model (State Model)?
1: Objects 2: Subjects 3: Rules
265
In terms of Security Models what iare the six primitives to the Harrison-Ruzzo Model (State Model)
1: Create Object 2: Create Subject 3: Destroy Subject 4: Destroy Object 5: Enter Right into Access Matrix 6: Delete Right from Access matrix
266
In terms of Security Models What are the four modes of operation?
1: Dedicated: 2: System high 3: Compartmented 4: Multilevel
267
In terms of modes of operation What is the dedicated mode?
Contains objects of one classification only. All subjects must have equal clearance or higher: Appropriate Clearance Formal access approval Kneed to Know
268
In terms of modes of operation What is the System high mode?
System contains an object-mix of clearance levels Subjects must have the same level of clearance as the highest object
269
In terms of modes of operation What is the Compartmented mode?
All subjects have the same clearance level of the objects but do not have the formal approval authority nor a need to know. Objects are places in compartments Use technical controls to enforce as opposed to policy.
270
In terms of modes of operation What is the Multilevel mode?
Stores objects of different sensitivity labels and allows subject access with differing clearances The reference Monitor mediates access
271
In terms of modes of operation Cam you implement both Discretionary AccessControl (DAC) and Mandatory Access Control (MAC)?
Yes May use a Discretionary Access Control (DAC) or Mandatory Access Control (MAC)
272
What are Evaluation Methods, Certification and Accreditation designed to do?
Designed to gauge real-world security systems and products.
273
What is the granddaddy of evaluation models developed by DOD in the 1980s.?
The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) is the granddaddy of evaluation models developed by DOD in the 1980s.
274
In terms of Evaluation Methods, Certification and Accreditation Name the three main evaluation models?
1: The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) 2: ITSEC (Information Technology Security Evaluation Criteria) 3: The International Common Criteria
275
In terms of Evaluation Methods, Certification and Accreditation why is the The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) significant?
The First significant attempt to define differing levels of security and access control.
276
In terms of Evaluation Methods, Certification and Accreditation What is the Rainbow series?
Beginning with the The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book), the Rainbow series is a set of 35 different security standards with widely ranging topics.
277
In terms of Evaluation Methods, Certification and Accreditation How is the The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) organizaed?
Divisions (Higher Numbers and Letters are more secure) D: Minimal Protection; systems that do not meet the requirements of higher divisions C: Discretionary Protection; DAC (Discretionary Access Control) C1: Discretionary Security Protection C2: Controlled Access Protection B: Mandatory Protection; MAC (Mandatory Access Controls) B1: Labeled Security Protection B2: Structured Protection B3: Security Domains A: Verified Protection A1: Verified Design (everything in B3 plus more controls)
278
In terms of Evaluation Methods, Certification and Accreditation Is the Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) still a valid model?
Old and no longer actively used but used as a reference for other models.
279
In terms of Evaluation Methods, Certification and Accreditation What is one limitation to the Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book) still a valid model?
Does not address networked issues.
280
In terms of Evaluation Methods, Certification and Accreditation What is the significance to the The Red Book (Trusted Network Interpretation)?
Brings Orange Book concepts to networked systems
281
In terms of Evaluation Methods, Certification and Accreditation What is the significance to the ITSEC (Information Technology Security Evaluation Criteria)?
The first successful international evaluation model
282
In terms of Evaluation Methods, Certification and Accreditation Hod does the ITSEC (Information Technology Security Evaluation Criteria) differ from the ?The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book)
Refers to Orange Book but separates functionality from assurance (Effectiveness and Correctness)
283
In terms of Evaluation Methods, Certification and Accreditation What are the equivalent ratings between the ITSEC (Information Technology Security Evaluation Criteria) and the The Trusted Computer System Evaluation Criteria (TCSEC – the Orange Book)
ITSEC TCSEC (Orange) E0 D F-C1 E1 C1 F-C2 E2 C2 F-B1 E3 B1 F-B2 E4 B2 F-B3 E5 B3 F-B3 E6 A1
284
In terms of Evaluation Methods, Certification and Accreditation What are the Additional Functionality Ratings in the ITSEC (Information Technology Security Evaluation Criteria) ?
Additional Functionality Ratings F-IN: High Integrity Requirements AV: High Availability Requirements DI: High Integrity Requirements for Networks DC: High Confidentiality Requirements for Networks DX: High Integrity and Confidentiality Requirements for networks.
285
In terms of Evaluation Methods, Certification and Accreditation What is the significance to the The International Common Criteria?
The second major international criteria effort behind ITSEC
286
In terms of Evaluation Methods, Certification and Accreditation What are the three design goals for the International Common Criteria?
1: Designed to avoid requirements beyond state of the art 2: Intended to evaluate commercially available as well as government produced 3: Primary Objective is to eliminate known vulnerabilities of the target for testing.
287
In terms of Evaluation Methods, Certification and Accreditation What are the four International Common Criteria Terms?
1: Target of Evaluation (ToE): the system which is being evaluated 2: Security Target (ST): The documentation describing the ToE including the security requirements and operational environment 3: Protection Profile (PP): an independent set of security requirements and objectives for a specific category of products 4: Evaluation Assurance Level (EAL): The score of the tested product.
288
In terms of Evaluation Methods, Certification and Accreditation What are the seven International Common Criteria Levels of Evaluation ?
EAL1: Functionally Tested EAL2: Structurally Tested EAL3: Methodically Tested and Checked EAL4: Methodically designed, tested and reviewed EAL5: Semi-formally designed and tested EAL6: Semi-formally verified, designed and tested EAL7: Formally verified, designed and tested
289
In terms of Evaluation Methods, Certification and Accreditation What is the PCI-DSS (Payment Card Industry- Data Security Standard)?
Created by the Payment Card Industry Security Standards Council (PCI-SCC) Seeks to protect credit cards by requiring vendors to take specific security precautions.
290
In terms of Evaluation Methods, Certification and Accreditation What are the five requriements that the PCI-DSS (Payment Card Industry- Data Security Standard) meets?
1: Security Management 2: Policies 3: Procedures 4: Network Architecture 5: Software Design
291
In terms of Evaluation Methods, Certification and Accreditation What are the six core principlas in the PCI-DSS (Payment Card Industry- Data Security Standard) meets?
1: Build and Maintain a secure network 2: Protect cardholder data 3: Maintain a vulnerability management program 4: Implement strong access control measures 5: Regularly monitor and test networks 6: Maintain an Information Security Policy
292
In terms of Evaluation Methods, Certification and Accreditation What is Certification and Accreditation
Certification means that a system has been certified to meet the security requirements of the data owner. Certification considers the system, the security measures taken to protect the system and the residual risk represented by the system. Accreditation is the data owner’s acceptance of the certification and the residual risk required before the system is put into action,
293
1: What type of memory is used often for CPU registers? A: DRAM B: Firmware C: ROM D: SRAM
D: SRAM
294
2: What type of attack is also known as a race condition? A: Buffer Overflow B: Cramming C: Emanations D: TOCTOU
D: TOCTOU
295
3: What model should you use if you are concerned with Confidentiality of Information? A: Bella-LaPadulla B: Biba C: Clark-Wilson D: Confidentiality Model
A: Bella-LaPadulla
296
4: On Intel x86 systems, the kernel normally runs at which CPU Ring? A: Ring 0 B: Ring 1 C: Ring 2 D: Ring 3
A: Ring 0
297
5: Which mode of operations has objects and subjects with various security labels from least to most secure or trusted? A: Compartmented B: Dedicated C: Multilevel Security D: System High
C: Multilevel Security
298
6: What type of Firmware is erased via ultraviolet light A: EPROM B: EEPROM C: Flash Memory D: PROM
A: EPROM
299
7: You are surfing the web via a wireless network. Your wireless network becomes unreliable, so you plug into a wired network to continue surfing. While you changed physical networks, your browser required no change. What security feature allows this? A: Abstraction B: Hardware Segmentation C: layering D: Process Isolation
C: layering
300
8: What programming language may be used to write applets that use a sandbox to provide security? A: Active X B: C++ C: Java D: Python
C: Java
301
9: What Common Criteria term describes the system or software being tested? A: EAL B: PP C: ST D: TOE
D: TOE
302
10:What nonvolatile memory normally stores the operating system kernel on an IBM PC-compatible system A: Disk B: Firmware C: Ram D: ROM
A: Disk
303
11: What type of system runs multiple programs simultaneously on multiple CPUs? A: Multiprocessing B: Multiprogramming C: Multitasking D: Multithreading
A: Multiprocessing
304
12: An attacker deduces that an organization is holding an offsite meeting and has few people in the building based on the low traffic volume to and from the parking lot and uses the opportunity to break into the building. What type of an attack has he launched? A: Aggregation B: Emanations C: inference D: Maintenance Hook
C: inference
305
13: An Open System is what? A: A Process that has not been terminated B: A System built from industry-standard parts C: Allows anyone to read and change the source code D: Contains free software
B: A System built from industry-standard parts
306
14: What security model has 8 rules? A: Graham-Denning B: Harrison-Ruzzo-Ullman C: TCSEC D: Zachman Framework
A: Graham-Denning
307
15: What is the highest TCSEC class applicable to discretionary access control systems which sends data across networks? A: A B: B C: C D: D
D: D