Sybex Chp 9 Flashcards

1
Q

Allows for a “sandbox” mode to isolate the program from the rest of the OS and enforces strict rules about resources those objects can access.

Java Applets
Active X Controls

A

Java Applets

Active X Controls are not subject to sandbox rules, have full access to the Windows OS, and can perform a number of privileged actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Grid Computing?

A

Grid Computing is a form of parallel distributed processing that loosely groups a significant number of processing nodes to work toward a specific processing goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the concerns with Grid Computing?

A

1) The content of each work packet is potentially exposed to the world
2) Potential risk of a compromise at the central grid servers could trick grid members into performing malicious actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True / False

SXML is often used to provide web-based SSO

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the goals of MDM

A

Mobile Device Management goals include:

1) improve security
2) provide monitoring
3) enable remote management
4) support troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IoT?

A

Internet of Things

Collection of devices that can communicate over the Internet with one another or with a control console in order to affect and monitor the real world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a wrapper used in a Trojan Horse?

A

A wrapper is something used to enclose or contain something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False

So that layer integrity is maintained, inner layers neither know or depend on outer layers

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensures that data existing at one level of security is not visible to processes running at different security levels.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requires that the OS provide separate memory spaces for each process’s instructions and data.

A

Process Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False

Process Isolation protects the integrity of a process

A

True

Process Isolation prevents unauthorized data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False

It is generally better to use APIs to ask for supervisory mode services or to pass control to trusted, well-protected supervisory mode processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is the application of the principal of least privilege to administrators.

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define covert channel

A

A method that is used to pass information over a path that is not normally used for communications.

Covert Timing Channel - conveys information by alerting the performance of a system component or modifying a resource’s timing in a predictable way.

Covert Storage Channel - conveys information by writing data to a common storage area where another process can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trusted Recovery

A

ensures that all system controls remain intact in the event of a crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Diddling

A

Making small (non-obvious) random or incremental changes to data during storage, processing, input, output, or transaction

Attack commonly performed by insiders

17
Q

TOCTOU is also called a __________

A

Time of Check, Time of Use id also called a:

Race Condition

18
Q

Simultaneous execution of multiple applications on a single processor

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multitasking

19
Q

More than one CPU harnesses the power of more than one processor to execute a single application

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multiprocessing

20
Q

Pseudo-simultaneous execution of two tasks on a single processor coordinated by the OS (usually done in batch)

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multiprogramming

21
Q

Permits multiple concurrents tasks to be performed within a single process (MS Word open with two documents)

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multithreading

22
Q

What is the most effective means for reducing risk of losing data on a mobile device, such as a notebook computer?

1) Defining a strong logon password
2) Minimizing sensitive data stored on the mobile device
3) Using a cable lock
4) Encrypting the hard drive

A

Minimizing sensitive data stored on the mobile device

think like a manager

23
Q

What type of electrical component serves as the primary building block for dynamic RAM?

1) Capacitor
2) Resistor
3) Flip-flop
4) Transistor

24
Q

What type of memory can be written to once?

ROM
PROM
EPROM
EEPROM

25
What type of memory is a system BIOS usually written to? ROM PROM EPROM EEPROM
EEPROM
26
What type of memory requires ultraviolet light to be shone through a window in order to be erased?
EPROM
27
What type of memory is directly available to the CPU? Real Memory Cache Memory Registry Memory Virtual Memory
Registry Memory
28
In what type of addressing scheme is the data actually supplied to the CPU as an argument to the instruction? Direct addressing Immediate addressing Base+offset addressing Indirect offsetting
Immediate addressing
29
In what type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand? Direct addressing Immediate addressing Base+offset addressing Indirect offsetting
Indirect offsetting
30
Which security principal mandates that only a minimum number of operating system processes should run in supervisory mode? Abstraction Layering Data hiding Least privledge
Least privledge
31
Which security principal takes the concept of process isolation and implements it using physical controls? Hardware segmentation Data hiding Layering Abstraction
Hardware segmentation