Security Operations Flashcards

1
Q

C2 is the lowest classification (TCSEC) that requires?

A

No data remanance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following represents the highest possible guarantee of security?

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the classification evaluation criterion for the B1 Level of TCSEC?

A

restrictions against covert channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is secure in each and every instance of its existence?

A

State Machine Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which TCSEC label represents systems that employ security domains?

A

B3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which TCSEC security label requires mandatory protection mechanisms for controls?

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCSEC level that directly addresses covert channels?

A

B2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security mode is represented by the state when users are limited to resources formal access approvals?

A

compartmented security zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Within what security mode does the system function at a single security level?

A

dedicated security mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not an element of the Clark Wilson Security model?

A

The classification of or levels of access are defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Method used to restrict communication to detailed and controlled intervals in order to maintain the security of a system

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the operating states is exemplified by a process that will resume execution as soon as its print job is fully sent to the print server?

A

Wait state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The more complex a system.

A

Less assurance it provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the fastest form of memory

A

cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of memory storage requires constant updates because the data it stores dissipates and decays?

A

dynamic RAM or RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What mechanism is used for a lower protection ring entity to communicate with a higher ring entity?

A

system call

17
Q

Which ring of protection do device drivers operate?

A

Ring 2

18
Q

What mode of operation exists when all users have the authority and need to know to access all resources?

A

Dedicated security mode

19
Q

Which O/S state represents a process in normal execution?

A

Problem State

20
Q

Which of the following components dictates when data is processed by the systems processor?

A

control unit

21
Q

What is the best description of a security kernel from a security point of view?

A

reference monitor

22
Q

The Orange book states that the Trusted Computing Base should uniquely identify each user for access purposes and__?

A

Assess the identity with all auditable actions taken by the individual

23
Q

What is the best description of the reference monitor?

A

a software component that determines if a user is authorized to perform a required operation.

24
Q

If an operating system allows sequential use of an object without refreshing it what security issue can arise?

A

Disclosure of residual data

25
Q

Which is the first level that requires classification labeling of data?

A

B1

26
Q

What are cognitive passwords?

A

Fact or opinion based information used to verify an individual ID

27
Q

What advantage does hardware have over software?

A

Difference to access without physical access

28
Q

Behavioral Based Systems AKA

A

Profile Based

29
Q

Kerberos

A

Trusted Third Party Authorization Protocol

30
Q

What is a straightforward approach that provides access rights to subjects for objects?

A

Access Control Matrix

31
Q

What represents the columns of the table if a db?

A

Attributes

32
Q

Rows in a db are called __?

A

Tuples

33
Q

database views

A

restrict user access to data in a db

34
Q

Primary service provided by Kerberos?

A

Authentication

35
Q

Which model introduces access to objects only through programs?

A

Clark Wilson

36
Q

What does not apply to system generated passwords?

A

Passwords are more vulnerable to brute force and dictionary attacks

37
Q

Which access control model is also called non-discretionary access control?

A

Role Based access control

38
Q

Which access control model uses directed graph?

A

Take Grant