5 - Security Architecture and Design Flashcards
- What is the principle of least privilege?a. All users are assigned a minimum standard level of access, then additional access is granted as neededb. A system is designed so there are the fewest number of different security access levels as possiblec. Users are assigned only enough access to accomplish their work tasksd. The least privileged users are assigned roles
C: The principle of least privilege is users are assigned only enough access to accomplish their work tasks.
- What security model is a directed graph that indicates the rights or privileges that a subject can transfer to an object or that a subject can obtain from another subject?a. State machine modelb. Bell-LaPadula modelc. Clark-Wilson modeld. Take-grant model
D: The take-grant model is a directed graph that indicates the rights or privileges that a subject can transfer to an object or that a subject can obtain from another subject.
- If the operating system fails to establish boundaries for the size and type of data that can be inputted, what malicious event or activity can occur?a. Denial of serviceb. Logic bombc. Buffer overflowd. Virus infection
C: Failing to control input may result in a buffer overflow.
- Which operating state represents a process in normal execution?a. Ready stateb. Wait statec. Supervisory stated. Problem state
D: The problem state is the state of a process performing normal execution.
- In order for an OS to remain stable, what must it be able to accomplish or perform?a. At least one calculation per secondb. Grant limited access to unauthorized usersc. Protect itself from users and softwared. Operate at Ring 3
C: An OS must protect itself from users and software to remain stable.
- What mode of operation exists when all users have the authorization and need-to-know to access all resources?a. Dedicated security modeb. System-high security modec. Compartmentalized security moded. Multilevel security mode
A: Dedicated security mode exists when all users have the authorization and need-to-know to access all resources.
- At which Ring of protection do device drivers operate?a. Ring 0b. Ring 1c. Ring 2d. Ring 3
C: Ring 2 is for device drivers.
- What mechanism is used for a lower protection ring entity to communicate with a higher protection ring entity?a. Hashingb. RPCc. Covert channeld. System call
D: A system call is needed for a lower protection ring entity to communicate with a higher protection ring entity.
- Of the four possible operating states of a system, which represents the state within which an application is being actively processed?a. Problem stateb. Ready statec. Wait stated. Supervisory state
A: The problem state is the execution of an application.
- The orange book security classifications such as C2 and B1 are focused on what?a. The entire computerb. The trusted computer basec. The entire networkd. Just the CPU and primary storage
B: The orange book classifications are focused on the TCB.
- Secondary storage is?a. Nonvolatile storage, such as a hard driveb. The RAM in a computerc. Allocated memory for programsd. The combination of RAM and space from a paging file
A: This is secondary storage.
- What is the most trusted component of a computer?a. Memoryb. CPUc. Hard drived. Network interface
B: The CPU is the most trusted component of a computer.
- A buffer overflow can cause all but which of the following?a. network throttlingb. system freezingc. system rebootingd. data corruption
A: Network throttling is usually not a function, symptom, or effect of a buffer overflow. Network throttling is a control feature to limit the bandwidth consumed by a specific application or service
- Once data has been processed by the CPU for a program, it is moved into memory areas known as?a. primary storageb. real storagec. secondary storaged. virtual storage
B: Once data has been processed by the CPU, it is moved into memory areas known as real storage. Real storage is the memory address space allocated for use by programs.
- What type of memory storage requires constant updates because the data it stores dissipates and decays?a. Static RAM or Random Access Memoryb. ROM or Read Only Memoryc. Dynamic RAM or Random Access Memoryd. EPROM or Erasable and Programmable Read Only Memory
C: Dynamic RAM or Random Access Memory requires constant updates because the data it stores dissipates and decays.
- Which of the following is the fastest form of memory?a. secondaryb. virtualc. reald. cache
D: Cache memory is a form of high-speed memory accessed directly by the CPU that operates at a higher rate than real memory.
- For security to be effective which of the following should not be true?a. security is added to a product after its initial developmentb. security is integrated into a product at the design stagec. security is engineered into the productd. security is implemented by default in the product
A: Adding security as an afterthought is not an effective means to provide adequate, functional, or even reliable security.
- Once security is implemented into the design of a product, it should also be all but which of the following?a. testedb. disabledc. certifiedd. audited
B: Security should not be disabled once it has been integrated into a product.
- If the operating system or an application fails to set boundaries on input data, what problem can occur?a. session hijackingb. access grabbingc. buffer overflowd. information disclosure
C: Failing to defined boundaries for input can result in a buffer overflow error.
- When a buffer overflow occurs, the extra data may flow into the CPU and cause what?a. loss of privilegesb. the system to drop the extra datac. an error event log is writtend. execution of malicious code in privileged mode
D: Buffer overflows often result in the execution of malicious code in privileged mode.
- The act of positioning data in one security division that is not accessibly by a subject of another security division is called what?a. Data hidingb. Layeringc. Data diddlingd. Abstraction
A: Data hiding is the placement of data in a different security level than a given subject in order to hide it from that subject.
- Which of the following security models is focused on protecting confidentiality?a. Biba modelb. Bell-LaPadula modelc. Take-Grant modeld. Clark-Wilson model
B: The Bell-LaPadula model is focused on protecting confidentiality.
- Which of the books from the Rainbow series is concerned with the interactions of computers over a communication medium?a. Orangeb. Tanc. Redd. Purple
C: The red book is concerned with the interactions of computers over a communication medium
- The ability for a single processor computer system to execute more than one process simultaneously is known as?a. multithreadingb. multitaskingc. multiprocessingd. multiplexing
B: Multitasking is when a computer system can execute more than one process simultaneously.
- The _______________ a security system, the _______________ it provides.a. less complex, less assurance b. greater complexity, greater assurance c. more complex, less assurance d. more complex, more assurance
C: The more complex a security system, the less assurance it provides.
- The collection of mechanisms within a computer system that work in harmony to enforce and support a security policy is known as?a. Ring 0b. an assurance packagec. white box systemd. trusted computing base
D: The collection of mechanisms within a computer system that work in harmony to enforce and support a security policy is known as the trusted computing base or TCB.
- Trusted computing base is important for all but which of the following reasons?a. TCB ensures that a properly designed system is fully secured. b. If the TCB meets specific requirements, it can be said to provide a specific level of trust.c. TCB can be built into a system, evaluated, and certified.d. TCB certification provides a standardized system to compare the security capabilities between different systems and to provide a standardized label of the level of security it provides.
A: No system is fully secure. TCB provides a means to measure and evaluate the level of security offered.
- In a trusted computer that employs the concept of protection rings, in which ring are hardware drivers typically located?a. Ring 0b. Ring 1c. Ring 2d. Ring 3
C: Device drivers are typically located in Ring 2.
- If a process in a higher protection ring number needs to communicate with a process or resource in a lower protection ring number, what must occur?a. buffer overflowb. execution priority shiftc. the process must be moved to a lower ring numberd. system call
D: A system call is required for a a process in a higher ring number needs to communicate with a process or resource in a lower ring number.
- Which of the four possible operating states is exemplified by a processes that will resume execution as soon as its print job is fully sent to the print server?a. Wait stateb. Ready statec. Problem stated. Supervisory state.
A: The wait state is the state of a process waiting for a specific event to finish, such as a print job.
- What component of a computer system is the most trusted element?a. CPUb. memoryc. storage devicesd. network interface
A: The CPU is the most trusted component of a computer system.
- Memory is controlled using a kernel level memory mapper and manager. This establishes an access control layer between software and memory, why?a. prevents buffer overflowsb. software is not trustedc. helps to minimize the use of secondary storaged. required by D1 TCSEC certification
B: Software is not trusted, therefore it is isolated from managing hardware (i.e. memory) directly.
- The security model that defines the relationships that allow a subject to transfer rights to objects is known as?a. Bell-LaPadula modelb. Biba modelc. Clark-Wilson modeld. Take-Grant model
D: The Take-Grant model defines the relationships that allow a subject to transfer rights to objects. It also defines the rights that a subject can take from another subject.
- The Bell-LaPadula security model is primarily concerned with protecting?a. confidentialityb. integrityc. non-repudiationd. accountability
A: The Bell-LaPadula security model is primarily concerned with confidentiality.
- The primary regulation of the Bell-LaPadula security model is?a. * (star) integrity axiomb. * (star) property rulec. No write upd. No read down
B: The * (star) property rule, no write down, is the primary regulation of the Bell-LaPadula security model.
- The Bell-LaPadula’s simple security rule is what? a. no write upb. no write downc. no read upd. no read down
C: No read up, the simple security rule, is the secondary regulation of the Bell-LaPadula security model.
- Resource isolation provides for all but which of the following?a. only auditing and tracking of major eventsb. subject and object are clearly identifiedc. enforced accountabilityd. independent assignment of permissions and rights
A: Resource isolation provides for auditing and tracking of all events, including minor ones.
- The separation of memory physically instead of just logically is an example of and a requirement for what?a. trusted computing baseb. hardware segmentationc. a division between user mode and kernel moded. data classification levels
B: The separation of memory physically instead of just logically is an example of and a require for hardware segmentation.
- _____________ means subjects are granted only the minimal amount of access required for them to complete their assigned work tasks.a. need to knowb. separation of dutiesc. least privileged. privilege elevation
C: Least privilege (or the principle of least privilege) means subjects are granted only the minimal amount of access required for them to complete their assigned work tasks.
- The method used to restrict communications to detailed and controlled interfaces in order to maintain the security of a system is?a. data diddlingb. data hidingc. abstractiond. layering
D: Laying restricts communications to detailed and controlled interfaces in order to maintain the security.
- The absence of a communication interface between security layers in order to prevent subjects from obtaining knowledge of a confidential resource is what?a. data hidingb. layeringc. data classificationd. abstraction
A: Data hiding is placing restricted data in a different security domain so a specific subject is unaware of its existence. Data hiding is also the absence of a communication interface between security layers in order to prevent subjects from obtaining knowledge of a confidential resource.
- Which of the following is not true of a state machine model?a. is secure in every instance of its existenceb. executes commands but not transactions securelyc. boots into a secure state, even after an error is encounteredd. restricts subjects to access resources
B: A state machine model executes commands and transactions securely.