01 - Flash Cards

1
Q

Computer Architecture

A
  • Engineering branch primarily involved in designing and developing computer systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware

A
  • Hardware refers to physical/tangible components of a computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Processor

A
  • It is a chip or set of chips that dictates and integrates all the major computer functions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name Execution Types

A
  • Multitasking
  • Multicore
  • Multiprocessing
  • Multiprogramming
  • Multithreading
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multitasking

A
  • Performing two or more tasks at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multicore

A
  • Term used for today’s CPUs as their chips have multiple cores that work at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiprocessing

A
  • In computing, multiprocessing refers to the use of multiple CPUs in order to generate more power and perform multiple operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Symmetric Multiprocessing?

A
  • Several processors within a single computer are sharing the same operative system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Massively Parallel Processing?

A
  • Processing that involves hundreds of processors using their own operating systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiprogramming

A
  • It is a rather obsolete form of parallel processing that uses a single processor to perform multiple tasks at the same time.
  • Since there is only one processor, execution of these tasks is pseudo simultaneous.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multithreading

A
  • In computing, it is a term that refers to several simultaneous tasks to be performed in a single process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single State System

A
  • System that processes only one security level at a given time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multistate System

A
  • System that processes several security levels at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List Protection Mechanisms

A
  • Protection Rings
  • Operational State
  • Security Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protection Rings

A
  • Method by which code and operating system components are organized in concentric rings in order to separate levels of interaction and protect data.
  • The highest privilege is within the innermost ring.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process States

A
  • In computing it is a term that refers to different forms of operation in which processes are run and executed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List All The Possible States for A Running Process

A
  • Ready State
  • Waiting State
  • Running State
  • Supervisory State
  • Stopped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ready State

A
  • Process is ready to continue or begin.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Waiting State

A
  • Process is halted due to an external condition.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Running State

A
  • CPU is executing the process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Supervisory State

A
  • State to be used when the process in order to ru requires higher privilege than its current.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Stopped State

A
  • Terminated process due to finishing the task or lacking the needed resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security Modes

A
  • Modes created by the US government for processing classified data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name Four Security Modes

A
  • Dedicated Mode
  • System High Mode
  • Compartmented Mode
  • Multilevel Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the Two Operating Modes?

A
  • User Mode
  • Privileged Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

User Mode

A
  • Basic mode for CPU operations in which only one part of the whole set of instructions is being run.
  • This mode is designed to minimize potential accidental damage that can be created.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Privileged Mode

A
  • Basic mode for CPU operations in which the whole set of instructions is being run.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Memory

A
  • Collection of all data computer needs to keep in store.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Read-Only Memory (ROM)

A
  • Type of computer memory that cannot be modified.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Programmable Read-Only Memory (PROM)

A
  • Similar to ROM, but the program is not “burned in” rather it allows the final user to burn in the content later after which the content cannot be changed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Erasable Programmable Read-Only Memory

A
  • It is a programmable read only memory programmable ROM that can be erased and reused.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Electronically Erasable Programmable Read-Only Memory

A
  • It is a programmable read only memory programmable ROM that can be erased by using electric voltage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Flash Memory

A
  • Memory that can be erased electronically and subsequently rewritten.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Random Access Memory

A
  • It is a form of computer data storage that stores data and machine code currently being used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Real Memory

A
  • Largest RAM storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cache RAM

A
  • Cache RAM is a smaller, faster memory which stores copies of the data that are more likely to frequently used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Dynamic RAM

A
  • It is a type of random access memory that stores each bit of data in a separate tiny capacitor that is contained within a circuit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Static RAM

A
  • It is a type of random access memory that stores each bit using a flip flop device that represents a switch to be positioned from 1 to 0 or vice versa.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Registers

A
  • Limited CPU memory required for arithmetic-logical unit to operate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Memory Addressing

A
  • Assigning memory address so that particular locations are easier to access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Register Addressing

A
  • Assigning register address so that particular locations are easier to access..
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Immediate Addressing

A
  • A way to refer to data while being provided to CPU in the form of instructions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Direct Addressing

A
  • Supplying CPU with an actual memory location address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Secondary Memory

A
  • Term that refers to memory storage on devices other than the CPU.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Data Storage Devices

A
  • Devices that store data that can be used on a computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Primary Storage

A
  • It essentially refers to RAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Secondary Storage

A
  • Term that refers to memory storage on devices other than the CPU such as flash drives,CDs, DVDs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Volatile Storage

A
  • Data storage devices created to lose the data like RAM.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Nonvolatile Storage

A
  • Data storage devices created to retain the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Random Access Storage Devices

A
  • Devices that let an operating system access the data stored at any point within the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Sequential Storage Devices

A
  • Devices that do not let an operating system access the data stored at any point within the system but rather all the data need to be processed until the desired point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Secondary Devices Storage Media Security Issues

A
  • Data may remain on a secondary device even after being erased
  • Secondary storage devices are prone to theft
  • Access can be fairly easy for some devices
53
Q

Monitor Security

A
  • Security of the data displayed on a monitor can be compromised by technologies such as TEMPEST.
54
Q

Printer Security

A
  • Shared printers can lead to security problems as printout often may be forgotten.
55
Q

Keyboards/Mice Security

A
  • Devices can be put into keyboards so that they record keystrokes and transmit them to a receiver.
56
Q

Modems Security

A
  • There are numerous way by which unauthorized users can create access to a modem.
57
Q

Firmware

A
  • Permanent software programmed into a read-only memory.
58
Q

BIOS

A
  • Basic input/output system is a type of firmware microprocessor uses to get the computer system upon the computer is turned on.
59
Q

UEFI

A
  • Unified Extensible Firmware Interface is a software interface between an operating system and hardware and it is expected to replace BIOS.
60
Q

Applets

A
  • Small programs that work independently from their server.
61
Q

Name Two Applet Types

A
  • Java Applets
  • ActiveX Controls
62
Q

Local Caches

A
  • Temporary stored information of a particular client.
63
Q

Data Flow Control

A
  • Monitoring data transfer between processes, devices, and networks.
64
Q

Aggregation

A
  • Combination of data records in order to gather more useful information.
65
Q

Inference

A
  • Combination of nonsensitive data records in order to gather more useful information and get access to more sensitive information.
66
Q

Data Mining

A
  • Analysing large databases in order to find certain correlations.
67
Q

Metadata

A
  • A set of data that describes and gives information about other data.
68
Q

Data Analytics

A
  • Examining large sets of data in order to extract useful information.
69
Q

Parallel Data Systems

A
  • Computing systems that perform a great number of operations simultaneously.
70
Q

List Two Types of Parallel Data Processing

A
  • Symmetric
  • Asymmetric
71
Q

Host-Terminal Model

A
  • Model where all functions and data are contained within one centralized system and users are physically distributed.
72
Q

Client-Server Models

A
  • Model where users operate independent computers but can access resources on networks servers.
73
Q

Cloud Computing

A
  • Type of computing that uses a network of remote servers on the Internet to store, manage, and process data instead of a local server.
74
Q

Hypervisor

A
  • Is a virtual machine monitor (VMM) that creates and runs virtual machines.
75
Q

Private Cloud

A
  • Cloud within an organization’s network that is separated from the internet.
76
Q

Public Cloud

A
  • Cloud available to the general public on internet.
77
Q

Hybrid Cloud

A

Combination of private and public clouds.

78
Q

Community Cloud

A
  • Cloud shared by a group of users or organizations.
79
Q

Grid Computing

A
  • It is a computer network with a central management system in which each computer’s resources are shared with every other computer in the system.
80
Q

Peer to Peer Technologies

A
  • Concept similar to grid computing, as the workload is shared among users.
  • However, there is no central management system.
81
Q

The Internet of Things

A
  • Concept that refers to interconnection computing devices embedded in everyday objects/appliances, enabling them to send and receive data over the internet.
82
Q

Industrial Control System

A
  • Devices that manage industrial machines and processes.
83
Q

Metacharacters

A
  • Characters that have a special meaning in programming that regular characters do not have.
84
Q

Directory Traversal

A
  • Type of an attack that allows an attacker to access any part of the file/system once it is in a root directory.
85
Q

Command Injection

A
  • It is a type of an attack in which the goal is execution of commands on the host operating system through a vulnerable application.
86
Q

Device Security

A
  • Wide range of security features available on a mobile device.
87
Q

Remote Wiping

A
  • In the context of security, it is the ability to delete data on a device remotely in case the device is stolen.
88
Q

Lockout

A
  • Device gets locked out in case the user fails to provide correct authorized credentials after several attempts.
89
Q

Screen Locks

A
  • Layer of security that prevents someone of just picking up the device and accessing its contents.
90
Q

What Does GPS Stand For?

A
  • Global Positioning System
91
Q

Application Control

A
  • Device management option that restricts applications that can be installed on a device.
92
Q

Storage Segmentation

A
  • Artificial groping of data stored on a medium.
93
Q

Asset Tracking

A
  • Management option used to track resources/inventory. Can be either active or passive.
94
Q

Inventory Control

A
  • It is a set of hardware and software based tools that automate the process of tracking inventory.
95
Q

Mobile Device Management

A
  • It is a term used to describe management of all mobile devices organization’s employees are using to access its resources.
96
Q

Device Access Control

A
  • Term that encompasses passwords and storage encryption.
97
Q

Removable Storage

A
  • Storage devices that can be physically removed from a mobile device such as a microSD card.
98
Q

List Ways in Which Application Security is Ensured

A
  • Key Management
  • Credential Management
  • Authentication
  • Geotagging
  • Encryption
  • Application Whistling
99
Q

Geotagging

A
  • GPS on a mobile device allows for tagging of photos so one has to be aware of potential security issues due to this feature.
100
Q

Application Whistling

A
  • It is a security option also known as deny by default as it blocks unauthorized application form operating on a mobile device.
101
Q

What Does BYOD Stand For?

A
  • Bring Your Own Device.
  • It refers to employees using their own devices to connect to organization’s network.
102
Q

What Does COPE Stand For?

A
  • Company-owned, personally enabled devices.
103
Q

What Does CYOD Stand For?

A
  • Choose your own device
104
Q

Antivirus Management

A
  • Policy that dictates whether mobile antivirus programs can be installed on a mobile devices and which ones.
105
Q

Mobile Device On-boarding

A
  • Installing all the security and management applications through secure settings.
106
Q

Mobile Device Off-boarding

A
  • Removal of all the business related data from a mobile device.
107
Q

Embedded System

A
  • Computer embedded in greater computer system
108
Q

Static System

A
  • Refers to a static environment, static conditions that do not change. It is a system that is to stay unaltered by the administrators and users.
109
Q

Network Segmentation

A
  • Network is isolated from all outside communications so communication happens only within segmented network users.
110
Q

When are Security Layers Used?

A
  • They are when data that is being used belong to different classification levels
111
Q

Application Firewall

A
  • It is a system filter that defines a set of communication rules for all the users.
112
Q

Network Firewall

A
  • Device used for network filtering.
113
Q

Wrapper

A
  • It is program used provide a layer of security to computer services and determine whether the service is authorized to execute..
114
Q

Five Types of Technical Mechanisms

A
  1. Layering
  2. Abstraction
  3. Data Hiding
  4. Process Isolation
  5. Hardware Segmentation
115
Q

List Policy Mechanisms

A
  • Principle of Least Privilege
  • Separation of Privilege
  • Accountability
116
Q

Covert Channels

A
  • Paths that are not normally used in communication
117
Q

List Two Types of Cover Channels

A
  • Covert Timing Channels
  • Covert Storage Channel
118
Q

Overt Channels

A
  • Known and expected channel of communication.
119
Q

Trusted Recovery

A
  • System that ensures that all security controls remain intact in case of an attack.
120
Q

Maintenance Hooks

A
  • Entrance points into a system with which only developer is familiar with.
121
Q

Incremental Attacks

A
  • Security attacks that happen in a gradual fashion.
122
Q

Data Diddling

A
  • Attacker enter a system and makes small gradual changes.
123
Q

Salami Attacks

A
  • Salami attack refers to small attacks add up to one major attack that can go undetected.
124
Q
A
125
Q
A
126
Q
A
127
Q
A
128
Q
A