Security Flashcards

1
Q

Define the Zero-Day Problem.

A

The Zero-Day Problem refers to vulnerabilities that are known to attackers but not yet known or patched by software vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a patch cycle.

A

A patch cycle involves discovering a vulnerability, creating and publishing a patch, and users installing the patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define zero-day vulnerability.

A

A zero-day vulnerability is a security flaw that is exploited before the vendor releases a patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the Principle of Least Privilege (PoLP).

A

PoLP states that users, applications, and systems should only have the minimum access necessary to perform required tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define sandboxing.

A

running programs in isolated environments to limit their capabilities and potential damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define SELinux.

A

a mandatory access control system in the Linux kernel developed by the NSA and Red Hat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define DAC.

A

allows users to control access permissions to their own files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define MAC.

A

Mandatory Access Control (MAC) restricts access based on policies set by an administrator, not the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define root user in Linux.

A

is the administrative user with unrestricted access to all commands and files in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a non-root user.

A

A non-root user is a standard user with limited permissions in the Linux operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define chmod command.

A

chmod changes the permissions of a file or directory in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define sudo command.

A

sudo allows a permitted user to execute a command as another user, typically the superuser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define file permissions in Linux.

A

File permissions control who can read, write, or execute a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define rwxr-xr-x.

A

Owner has read, write, execute; group and others have read, execute only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the numeric representation of file permissions.

A

File permissions can be represented in numbers, e.g., 755 = rwxr-xr-x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define SELinux enforcing mode.

A

Policies are enforced and violations are logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define SELinux permissive mode.

A

Policies are not enforced, but violations are logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define SELinux disabled mode.

A

SELinux is off, and violations are not logged.

19
Q

Define SELinux labeling.

A

Every process and file has a label, and access rules are based on these labels.

20
Q

Define SELinux policy.

A

A set of rules determining what labeled processes can access which labeled objects.

21
Q

Define type enforcement.

A

A model in SELinux where access is granted based on the types assigned to processes and objects.

22
Q

Define MCS (Multi-Category Security).

A

A SELinux feature that allows the same type to be reused with unique categories to separate access.

23
Q

Define MLS (Multi-Level Security).

A

An SELinux model where access is based on hierarchical security levels (e.g., secret, top-secret).

24
Q

Define a process label.

A

A security context assigned to a process used to determine access rights.

25
Define an object label.
A label assigned to a file or directory that specifies access permissions.
26
Define dominance in MLS.
A higher-level label (e.g., Greyhound) can access objects with a lower label (e.g., Chihuahua), but not vice versa.
27
Define the SELinux rule ‘allow cat cat_chow : food eat;’.
This rule allows the process type cat to access object type cat_chow for the class food and permission eat.
28
Define what happens if a process violates SELinux policy
Answer: The action is denied, and in enforcing mode, the violation is logged.
29
Define the benefit of PoLP in compromised accounts.
It limits the attacker’s access, reducing potential damage.
30
Define the inherent insecurity of computers.
Modern computing systems are too complex to be completely secure due to flaws and human error.
31
Define why prompt patching is important.
Answer: It protects systems from known vulnerabilities before they can be exploited.
32
Define what happens during the patch delay window.
Answer: Systems are highly vulnerable as attackers and vendors race against each other.
33
Define the ls -l command.
Answer: Displays file permissions and attributes in Linux.
34
Define the read permission in Linux.
Answer: Allows the viewing of a file's contents.
35
Define the write permission in Linux.
Answer: Allows editing or modifying the file.
36
Define the execute permission in Linux.
Answer: Allows running the file as a program or script.
37
Define the numeric value of read permission.
Answer: 4
38
Define the numeric value of write permission.
2
39
Define the numeric value of execute permission.
1
40
Define what 755 means in file permissions.
Answer: Owner has full permissions, group and others have read and execute only.
41
Define the concept of ‘everything is denied by default’ in SELinux.
Answer: SELinux blocks all actions unless explicitly allowed by policy.
42
Define how MCS differs from type enforcement.
Answer: MCS uses categories to further restrict access among subjects with the same type.
43
Define an example of MLS policy application.
Answer: A Greyhound process can access both Greyhound and Chihuahua data, but not vice versa.
44
Define why creating separate types for each subject is not scalable.
Answer: It leads to policy explosion and becomes hard to manage.