Practice test Flashcards
The Brewer-Nash model
Chinese wall-Conflicts of interest pertain to accessing company-sensitive information from different companies that are in direct competition with one another
The Digital Signature Standard approves three encryption algorithms for use in digital signatures
the Digital Signature Algorithm (DSA); the Rivest, Shamir, Adleman (RSA) algorithm; and the Elliptic Curve DSA (ECDSA) algorithm.
In the subject/object model of access control, the user or process making the request for a resource is the …..of that request. In this example, Harry is requesting resource access and is, therefore, the subject.
subject
The use of a sandbox is an example of ……
confinement
What concept describes the degree of confidence that an organization has that its controls satisfy security requirements
Assurance
The Simple Integrity Property
states that an individual may not read a file classified at a lower security level than the individual’s security clearance.
The Trusted Platform Module (TPM)
is a hardware security technique that stores an encryption key on a chip on the motherboard and prevents someone from accessing an encrypted drive by installing it in another computer.
A preaction fire suppression system activates in two steps.
The pipes fill with water once the early signs of a fire are detected. The system does not dispense water until heat sensors on the sprinkler heads trigger the second phase.
The *-Security Property
The *-Security Property states that an individual may not write to a file at a lower classification level than that of the individual. This is also known as the confinement property
The Diffie-Hellman algorithm allows
allows for the secure exchange of symmetric encryption keys over a public network.
Protection Profiles (PPs) specify the ……… and protections that must be in place for a product to be accepted under the ….
security requirements &Common Criteria.
……. says that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Kerckhoff’s principle
The *-Integrity Property
states that a subject cannot modify an object at a higher integrity level than that possessed by the subject.
Covert channel
A method used to pass information over a path not normally used for communication.
Time of use:
The time at which a subject can access an object.
Parameter checking
A method that can help prevent buffer overflow attacks.
Race condition
The exploitation of difference between time of check and time of use.
The Ready state is used when
a process is prepared to execute but the CPU is not available
The Running state
is used when a process is executing on the CPU
The Waiting state
is used when a process is blocked waiting for an external event.
The Stopped state is
s used when a process terminates
EAL1 evaluation assurance level under the Common Criteria
EAL1 assurance applies when the system in question has been functionally tested. It is the lowest level of assurance under the Common Criteria.
Multistate systems
are certified to handle data from different security classifications simultaneously by implementing protection mechanisms that segregate data appropriately.
The verification process is similar to the certification process in that it validates security controls
Verification may go a step further by involving a third-party testing service and compiling results that may be trusted by many different organizations. Accreditation is the act of management formally accepting an evaluating system, not evaluating the system itself.