Chapter 9 Flashcards

1
Q

What describes where multiple concurrent tasks can operate under a single process?

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ring has the highest level of privilege and usually the kernel resides on this level.

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What ring deals with the various tasks, operations performed, processes switched and so forth.

A

Ring 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What ring deals with I/O drivers and system utilities resides and can access peripheral devices and other special files.

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What ring runs in user mode ?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What rings run in supervisory/privilege mode ?

A

Ring 0-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What processing state represents when a process can resume or begin processing as soon as it is schedule for execution.

A

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What processing state represents when a process executes on a CPU and keeps going until it finishes, its time splice expires, or is blocked.

A

Running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What processing state represents when a process is ready for continued execution but is waiting for I/O to be serviced before it can continue processing.

A

Waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What processing state represents when a process must perform an action that requires privileges that are greater than the problem state’s set of privileges.

A

Supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of flash memory ?

A

NAND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many registers does a typical CPU have?

A

8 to 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When the CPU needs information from one of its registers to complete an operation, what does it use ?

A

Register Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is not a memory addressing scheme but rather a way of referring to data that is supplied to the CPU as part of its instruction.

A

Immediate Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is more flexible than immediate addressing?

A

Direct Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What describes where the CPU is provided with an actual address of the memory location to access ?

A

Direct Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What uses a scheme similar to direct addressing?

A

Indirect Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What describes where the CPU reads one address and is then given the actual address where the data resides.

A

Indirect Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What uses a value stored in one of the CPUs’s registers or pointers as the base location from which to begin counting.

A

Base+Offset Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the most common type of virtual memory ?

A

Pagefile/Swapfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What contains data previously stored in real memory but not recently used ?

A

Pagefile/Swapfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a special type of secondary memory that is used to expand the addressable space of real memory?

A

Virtual Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What term is commonly used to refer to magnetic, optical, or flash based media or other storage devices?

A

Secondary Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the primary drawback with virtual memory ?

A

Paging operations that occur between primary and secondary memory is slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a common sequential storage device ?
Magnetic Tape Drive
26
What attack freezes memory chips to delay the decay of resident data when the system is turned off.
Cold Boot Attack
27
What is an effective safeguard against emanation attacks ?
TEMPEST
28
What describes a box, mobile room, or entire building designed with external metal skin that surround the outside.
Faraday Cage
29
What is a TEMPEST countermeasure that implements both a faraday cage and white noise to protect a specific area.
Control Zone
30
What are all the techniques that can protect against emanation?
Shielding, TEMPEST countermeasures, and antenna management
31
What replaced BIOS?
UEFI
32
What provides support for larger hard drives, faster boot times, enhanced security features, and use a mouse during BIOS changes.
UEFI
33
What describes the implementation of a malicious variation of official BIOS or firmware is installed?
Phlashing
34
What ensures that only drivers and OSs that are pre approved by digital certificate is installed?
Boot Attestation/Secure Boot
35
What protects against rootkits and backdoors when the system is booting ?
Boot Attestation/Secure Boot
36
What is an optional feature of UEFI that takes a hash calculation of every element involved in the booting process?
Measured Boot
37
What prohibits JavaScript code from accessing content from another origin?
Same-Origin Policy
38
What are some ways to protect your website from JavaScript exploitation?
Keep browsers updated (client-side) Implement JavaScript subsets (ADsafe, Caja, Secure ECMAScript) (server-side) Use a content security policy
39
What attempts to enforce same-origin restrictions for most browser side active technologies.
CSP
40
What are some browser helper objects and extensions that help reduce JavaScript exploitation?
Firefox NoScript Edge and Chrome UBlock
41
What describes where processors share not only a common OS, but also a common data bus and memory resources.
SMP
42
What describes where processors operate independently and have their own OS, data bus, and memory resources.
AMP
43
What describes where numerous AMP systems are linked together to complete one task?
MPP
44
What is similar to grid computing but has no central management system and services are done in real time.
Peer to peer
45
What are some security concerns with peer to peer computing?
Pirating copyright materials Eavesdropping on distributed content Lack of central control/oversight All services being consumed at once
46
What are some industrial control systems?
DCS PLC SCADA
47
What Industrial control system focuses on processes and is state driven?
DCS
48
What industrial control system focuses on data-gathering and is event driven?
SCADA
49
Which industrial control system is suitable for managing systems over large geographic areas?
SCADA
50
What industrial control system is more suitable for large scale environments in a single location?
DCS
51
What are some common security controls for DCS, PLC, and SCADA systems?
Isolating networks Limiting access logically and physically Code restrictions Logging activity
52
What are some common DCE IDLs?
RPC CORBA DCOM
53
What are some security concerns with DCEs?
Interconnectedness of components Access by unauthorized users Masquerading, impersonation, or spoofing attacks Security control bypass or disablement Communication eavesdropping Insufficient authentication Lack of monitoring, logging, and auditing Accountability issues
54
What are two ways to secure DCEs?
Encryption Strong multi factor authentication
55
What happens when a service is running on insufficient resources, has an unforeseen traffic spike, or when supporting systems fail.
Benign DoS
56
When is a hard-real time solution for RTOS used?
Mission Critical Operations
57
When is a soft real-time solution for RTOS used ?
Consumer electronics
58
What type of RTOS system will switch between operations or tasks based on pre assigned priorities?
Event-driven RTOS
59
What type of RTOS system will switch between operations or tasks based on clock interruptions or specific time intervals.
Time-sharing RTOS
60
What are some security concerns with RTOS?
Use of custom code that could include bugs or flaws May process bogus datasets or requests by malware
61
What are ways to secure RTOS systems?
Isolation Communication monitoring
62
What are some ways to secure IoT devices ?
Deploy a separate network Keeping systems patched Limiting physical and logical access Monitoring all activity Implementing firewalls and filtering
63
What are some examples of microcontrollers?
Raspberry Pi Arduino FPGA
64
What describes the use of classification labels on data and packets?
Logical Isolation
65
What describes the implementation of network segmentation or air gaps between networks of different security levels ?
Physical Isolation
66
What occurs when an org deploys numerous VMs without an overarching IT management or security plan in place?
VM sprawl
67
How can you prevent/avoid a VM sprawl?
Establishing a policy for developing and deploying VMs
68
When occurs when software within a guest OS is able to breach isolation protection provided by the hypervisor to violate the container of other guest OSs?
VM Escape
69
What are some ways to stop/mitigate VM escape ?
Keep sensitive systems and data on separate physical machines Keep all hypervisor softwares current with vendor patches Monitor attack, exposure, and abuse indexes
70
What was intended to replace MDM and EMM and is a single management platform to support mobile devices, IoT, PC, wearables, and ICS.
UEM
71
What prevents any and all software including malware from execution unless they’re on the pre approved list?
Application Allow Listing / Whitelisting
72
What is the activity of of installing an app on a device by bringing the installer file to the device through a file transfer or USB?
Side loading
73
What can prevent side loading ?
Enforcing all apps to be digitally signed
74
What conveys information by altering the performance of a system in a predictable manner?
Covert Timing Channel
75
What conveys information by writing data to a common storage area where another process can read it ?
Covert Storage Channel
76
What malware can hid from detection, and prevent its files and processes from being viewed?
Rootkit
77
What are two forms of incremental attacks ?
Salami Data Diddling
78
What happens when an attacker gains access to a sys and makes small incremental changes to data during storage, processing input, and output ?
Data Diddling
79
What are ways to protect against data diddling ?
Encrypting file systems File Monitoring integrity checking
80
What attack represents where an attacker slowly steals away at assets or other records of financial value?
Salami
81
What are ways to protect against salami attacks ?
Separation of duties Proper employee education Control over code
82
What describes the change in how hardware management is viewed as another collection to be managed the same way software is managed.
IaC
83
What is a framework to automate the processes of network monitoring and response?
SDV
84
What is the concept of replacing physical elements with solutions provided virtually by a third party provider.
SDDC / VDC