Security Operations Flashcards

(38 cards)

1
Q

C2 is the lowest classification (TCSEC) that requires?

A

No data remanance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following represents the highest possible guarantee of security?

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the classification evaluation criterion for the B1 Level of TCSEC?

A

restrictions against covert channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is secure in each and every instance of its existence?

A

State Machine Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which TCSEC label represents systems that employ security domains?

A

B3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which TCSEC security label requires mandatory protection mechanisms for controls?

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCSEC level that directly addresses covert channels?

A

B2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security mode is represented by the state when users are limited to resources formal access approvals?

A

compartmented security zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Within what security mode does the system function at a single security level?

A

dedicated security mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not an element of the Clark Wilson Security model?

A

The classification of or levels of access are defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Method used to restrict communication to detailed and controlled intervals in order to maintain the security of a system

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the operating states is exemplified by a process that will resume execution as soon as its print job is fully sent to the print server?

A

Wait state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The more complex a system.

A

Less assurance it provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the fastest form of memory

A

cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of memory storage requires constant updates because the data it stores dissipates and decays?

A

dynamic RAM or RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What mechanism is used for a lower protection ring entity to communicate with a higher ring entity?

17
Q

Which ring of protection do device drivers operate?

18
Q

What mode of operation exists when all users have the authority and need to know to access all resources?

A

Dedicated security mode

19
Q

Which O/S state represents a process in normal execution?

A

Problem State

20
Q

Which of the following components dictates when data is processed by the systems processor?

21
Q

What is the best description of a security kernel from a security point of view?

A

reference monitor

22
Q

The Orange book states that the Trusted Computing Base should uniquely identify each user for access purposes and__?

A

Assess the identity with all auditable actions taken by the individual

23
Q

What is the best description of the reference monitor?

A

a software component that determines if a user is authorized to perform a required operation.

24
Q

If an operating system allows sequential use of an object without refreshing it what security issue can arise?

A

Disclosure of residual data

25
Which is the first level that requires classification labeling of data?
B1
26
What are cognitive passwords?
Fact or opinion based information used to verify an individual ID
27
What advantage does hardware have over software?
Difference to access without physical access
28
Behavioral Based Systems AKA
Profile Based
29
Kerberos
Trusted Third Party Authorization Protocol
30
What is a straightforward approach that provides access rights to subjects for objects?
Access Control Matrix
31
What represents the columns of the table if a db?
Attributes
32
Rows in a db are called __?
Tuples
33
database views
restrict user access to data in a db
34
Primary service provided by Kerberos?
Authentication
35
Which model introduces access to objects only through programs?
Clark Wilson
36
What does not apply to system generated passwords?
Passwords are more vulnerable to brute force and dictionary attacks
37
Which access control model is also called non-discretionary access control?
Role Based access control
38
Which access control model uses directed graph?
Take Grant