Chapter 9 Flashcards

1
Q

an initiative by the DHS to facilitate the open and free exchange of IOCs and other cyberthreat information between the US fed and the private sector in an automated and timely manner

A

Automated indicator sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an observable along with a hypothesis about a threat

A

indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an identified face of occurrence, such as the presence of a malicious file

A

observable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which organization manages AIS?

A

National Cybersecurity and Communications Integration Center (NCCIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6 technical mechanisms implemented via architecture

A

layering
abstraction
data hiding
trusted recovery
process isolation
hardware segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the chip that governs all major operations; can perform a limited set of logical and computational operations

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

handling two or more tasks simultaneously; a single core CPU is still only executing a single process at a time but is able to “juggle” multiple tasks for the user.

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the CPU contains multiple independent execution cores that can operate simultaneously and independently

A

Multicore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

harnessing the power of more than one processor to complete the execution of a multithreaded application

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when multiprocessor systems assign or dedicate a process or execution threat to a specific CPU

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

when multiprocessor systems assign or dedicate a process or execution threat to a specific CPU

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pseudo-simultaneous execution of two tasks on a single processor; batches or serializes multiple processes. This method delays each individual task, but across all processes in the batch total time is reduced.

A

multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

multiple concurrent tasks are performed within a single process; often used in applications where frequent context switching between active processes causes excessive overhead

A

multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an OS model that organizes code and components in to concentric rings, where the deeper inside you go the higher privilege level is associated with the code

A

protection rings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the part of an OS that always remains resident in memory so that it can run on demand at any time

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which ring does the kernel reside on?

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which ring do somewhat privileged things like I/O drivers and system utilities?

A

Ring 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

where do applications and peripheral devices reside?

A

the outermost ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which ring runs in user mode?

A

Ring 3 (outermost ring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which rings run in supervisory or privileged mode?

A

Rings 0-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

5 process states

A

ready
running
waiting
supervisory
stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

which process state is when the process executes on the CPU?

A

Running or problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which state is when a process is ready to resume or being processing?

A

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what state is when a process is ready for continued execution but is waiting for I/O to be serviced?

A

waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what state is when a process must perform an action that requires higher privileges?

A

supervisory mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what state is when a process finishes or must be terminated?

A

stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

the hardware component that is a storage bank for information that the computer needs to keep readily available

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

memory the system can read but can’t change, contents are usually burned in at the factory

A

ROM - Read-Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which part of memory includes the POST series of diagnostics that run on boot?

A

ROM - Read Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

this kind of ROM isn’t burnt in at the factory, but incorporates special functionality that allows an end user to burn in the chip’s content later. Afterwards it cannot be altered

A

PROM - Programmable Read-Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

this kind of ROM can be programmed and erased with ultraviolet light

A

UVEPROM - UV Erasable Programmable Read-Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

this kind of ROM can be programmed and erased with electronic volatage

A

EEPROM - electronically erasable programmable read-only memory

33
Q

a nonvolatile form of storage media that can be electronically erased and rewritten in blocks or pages. widely used on memory cards, thumb drives, mobile devices, and SSDs

A

flash memory

34
Q

readable and writable memory that is retained only when power is continuously supplied to it

A

RAM - Random Access Memory

35
Q

the largest RAM storage resource made of a number of dynamic RAM chips, must be refreshed by the CPU on a periodic basis

A

Real memory, main memory, or primary memory

36
Q

this type of RAM contains an onboard cache of extremely fast memory used to hold data on which it will operate

A

cache RAM

37
Q

this kind of RAM uses a series of capacitors to hold either a charge (1) or no charge (0)

A

dynamic RAM

38
Q

this kind of RAM uses a logical device known as a flip-flop, which is basically a switch that gets moved to the on/off position to represent 1 or 0. the CPU does not need to check this RAM to make sure the positions of these flip-flops do not change, so there is no CPU overhead.

A

Static RAM

39
Q

memory onboard a CPU that provides it with directly accessible memory locations that the ALU uses when performing calculations

A

registers

40
Q

the brain of the CPU

A

Arithmetic-logical unit (ALU)

41
Q

this memory addressing scheme refers to one of the registers

A

register addressing

42
Q

this scheme refers to data that is supplied to the CPU as part of an instruction - it is not really an addressing scheme since the information does not need to be retrieved from a memory location

A

Immediate Addressing

43
Q

this type of addressing scheme is the actual address of the memory location

A

direct addressing

44
Q

this addressing scheme directs the CPU to a memory address that contains another memory address.

A

Indirect Addressing

45
Q

this addressing scheme uses a value stored in one of the CPU’s registers or pointers as the base location from which to begin counting

A

Base+Offset Addressing

46
Q

this type of memory is magnetic, optical, or flash-based media that contain data not immediately available to the CPU

A

Secondary Memory

47
Q

this type of memory is used to expand the addressable space of real memory

A

virtual memory

48
Q

this kind of memory is used to store information that may by used by a computer any time after it’s written

A

data storage devices

49
Q

the type of memory that will lose data quickly or when power is lost

A

volatile

50
Q

an attack that freezes the memory chips to delay the decay of resident data when the system is turned off

A

cold boot attack

51
Q

safeguards used to protect against emanation attakcs

A

TEMPEST

52
Q

malicious code embedding itself into UEFI, BIOS, or firmware

A

phlashing

53
Q

a single computer contains multiple processors that are threated equally and controlled by a single OS

A

symmetric multiprocessing (SMP)

53
Q

a single computer contains multiple processors that are threated equally and controlled by a single OS

A

symmetric multiprocessing (SMP)

54
Q

a computer having multiple processors that are operating independently of one another with its own OS, data bus, and memory resources

A

Asymmetric multiprocessing (AMP)

55
Q

many AMP systems are linked together for computationally intensive tasks

A

massive parallel processing (MPP)

56
Q

a form of parallel distributed processing that loosely groups a significant number of processing nodes into a grid

A

grid computing

57
Q

what is the biggest security concern with grid computing?

A

grid computing projects are open to the world, so they are not able to maintain secrecy and protect private or proprietary data

58
Q

networking and distributed application solutions that share tasks and workloads among peers

A

Peer-to-peer (P2P)

59
Q

device that controls industrial processes and machines

A

industrial control system (ICS)

60
Q

which committee is maintaining guidlelines for securing ICS?

A

ISA99 - integrated into the IEC

61
Q

a collection of individual systems that work together to support a resource or provide a service

A

distributed system, distributed computing environment (DCE)

62
Q

a collection or ledger of records, transactions, operations, or other events that are verified using hashing, timestamps, and transaction data. each time a new element is added the whole ledger is hashed again

A

blockchain

63
Q

methods to secure DCE

A

homomorphic encryption
MFA

63
Q

methods to secure DCE

A

homomorphic encryption
MFA

64
Q

the concept that once information has been converted into a binary form and stored, it is subject to the laws of the country within which the storage device resides

A

data sovereignty

65
Q

computing platforms designed to perform complex calculations at extremely high speeds

A

High performance computing (HPC)

66
Q

data and the compute resources are located as close as possible in order to optimize bandwidth use while minimizing latency

A

edge computing

67
Q

sensors, IoT devices, or edge devices collect data and transfer it back to a central location for processing. the processing location is in the LAN

A

fog computing

68
Q

devices that offer a computational means to control something in the physical world

A

cyber-physical devices

69
Q

the concept that a server never changes once it is deployed

A

immutable architecture

70
Q

native or bare-metal hypervisor

A

type I

71
Q

a hosted hypervisor

A

type II hypervisor

72
Q

when an organization deploys numerous VMs without an orveraching IT management or security plan in place

A

VM sprawl

73
Q

numerous underutilized servers are operating in the server room taking up space and electricity

A

server sprawl

74
Q

eliminating the duplication of OS elements in a VM; each application is placed into a container that includes only the actual resources needed to support the enclosed application

A

containerization

75
Q

the platform or server is managed by the cloud service provider (CSP)

A

serverless architecture

76
Q

an attack in which attacker gains access to a system and makes small, random, changes to data during storage, processing, input, output or transaction rather than altering file contents

A

data diddling