Ch.9 Flashcards

1
Q

Which type of memory chip can be erased only when it is removed from the computer and exposed to a special type of ultraviolet light?

A. ROM
B. PROM
C. EPROM
D. EEPROM

A

C. EPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of electrical component serves as the primary building block for dynamic RAM chips?

A. Capacitor
B. Resistor
C. Flip-flop
D. Transistor

A

A. Capacitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which one of the following storage devices is most likely to require encryption technology in order to maintain data security in a networked environment?

A. Hard disk
B. Backup tape
C. Removable drives
D. RAM

A

C. Removable Drives

Removable drives are easily taken out of their authorized physical location, and it is often not possible to apply operating system access controls to them. Therefore, encryption is often the only security measure short of physical security that can be afforded to them. Backup tapes are most often well controlled through physical security measures. Hard disks and RAM chips are often secured through operating system access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What security principle helps prevent users from accessing memory spaces assigned to applications being run by other users?

A. Separation of privilege
B. Layering
C. Process isolation
D. Least privilege

A

Answer: C Process Isolation

Process isolation provides separate memory spaces to each process running on a system. This prevents processes from overwriting each other’s data and ensures that a process can’t read data from another process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security principle mandates that only a minimum number of operating system processes should run in supervisory mode?

A. Abstraction
B. Layering
C. Data hiding
D. Least Privilege

A

D. Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which security principle takes the concept of process isolation and implements it using physical controls?

A. Hardware segmentation
B. Data hiding
C. Layering
D. Abstraction

A

A. Hardware Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most commonly overlooked aspect of mobile phone eavesdropping is related to which of the following?

A. Storage device encryption
B. Screen locks
C. Overhearing conversations
D. Wireless networking

A

C. Overhearing conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What is the name of the concept that java implemented to isolate java codes from the rest of the operating system?
A. Applets
B. Sandbox
C. Active X
D. JVM
A

B. Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What is Microsoft's version of an applet called?
A. Applets
B. Sandbox
C. Active X
D. JVM
A

C. Active X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Select all of the primary storage?
A. Ram
B. SSD
C. CD
D. HDD
A

A. Ram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly