Chapter 9: Security Vulnerabilities, Threats, and Countermeasures Flashcards

1
Q

the security design principle that indicates that organizations do not operate in isolation

A

Shared responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an initiative by the Department of Homeland Security (DHS) to facilitate the open and free exchange of indicators of compromise (IoCs) and other cyberthreat information between the U.S. federal government and the private sector in an automated and timely manner (described as “machine speed”)

A

Automated indicator sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

any tangible part of a computer that you can actually reach out and touch, from the keyboard and monitor to its CPU(s), storage media, and memory chips.

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

means handling two or more tasks simultaneously.

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Today, most CPUs are ____. This means that the CPU is now a chip containing two, four, eight, dozens, or more independent execution cores that can operate simultaneously and/or independently.

A

multicore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a _______ harnesses the power of more than one processor to complete the execution of a multithreaded application.

A

multiprocessor system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves the pseudo-simultaneous execution of two tasks on a single processor coordinated by the OS as a way to increase operational efficiency.

A

Multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ permits multiple concurrent tasks to be performed within a single process.

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

From a security standpoint, _____ organize code and components in an OS (as well as applications, utilities, or other code that runs under the OS’s control) into concentric rings

A

protection rings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the _____, a process is ready to resume or begin processing as soon as it is scheduled for execution.

A

ready state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The _______ is when a process executes on the CPU and keeps going until it finishes, its time slice expires, or it is blocked for some reason (usually because it has generated an interrupt for I/O).

A

running state or problem state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The_______ is when a process is ready for continued execution but is waiting for I/O to be serviced before it can continue processing

A

waiting state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _______ is used when the process must perform an action that requires privileges that are greater than the problem state’s set of privileges, including modifying system configuration, installing device drivers, or modifying security settings.

A

supervisory state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a process finishes or must be terminated (because an error occurs, a required resource is not available, or a resource request can’t be met), it goes into a _____ state.

A

supervisory state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the storage bank for information that the computer needs to keep readily available.

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

memory the system can read but can’t change (no writing allowed).

A

Read-only memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a ____ chip’s contents aren’t “burned in” at the factory as with standard ROM chips. Instead, a _____ incorporates special functionality that allows an end user to burn in the chip’s contents later.

A

PROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a nonvolatile form of storage media that can be electronically erased and rewritten.

A

Flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

readable and writable memory that contains information a computer uses during processing.

A

Random access memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

There are two main types of RAM: _____ RAM and ____ RAM

A

dynamic and static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The CPU also includes a limited amount of onboard memory, known as _______

A

registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When using memory resources, the processor must have some means of referring to various locations in memory. The solution to this problem is known as ______

A

memory addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a term commonly used to refer to magnetic, optical, or flash-based media or other storage devices that contain data not immediately available to the CPU.

A

Secondary memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ is a special type of secondary memory that is used to expand the addressable space of real memory.

A

Virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

______ are used to store information that may be used by a computer any time after it’s written.

A

Data storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

the RAM that a computer uses to keep necessary information readily available to the CPU while the computer is running.

A

Primary memory

27
Q

includes all the familiar long-term storage devices that you use every day.

A

Secondary memory

28
Q

There is a memory compromise, called the_____ attack, that freezes memory chips to delay the decay of resident data when the system is turned off or the RAM is pulled out of the motherboard.

A

cold boot

29
Q

Data may remain on secondary storage devices even after it has been erased. This condition is known as _______.

A

data remanence

30
Q

The types of countermeasures and safeguards used to protect against emanation attacks are known as _____ countermeasures.

A

TEMPEST

31
Q

a term used to describe software that is stored in a ROM or an EEPROM chip. This type of software is changed infrequently (actually, never, if it’s stored on a true ROM chip as opposed to an EEPROM or flash chip) and often drives the basic operation of a computing device.

A

Firmware

32
Q

the legacy basic low-end firmware or software embedded in a motherboard’s EEPROM or flash chip. The ____ contains the OS-independent primitive instructions that a computer needs to start up and load the OS from disk.

A

Basic input/output system (BIOS)

33
Q

The process of updating the UEFI, BIOS, or firmware is known as _____.

A

flashing

34
Q

_______ is a feature of UEFI that aims to protect the local OS by preventing the loading or installing of device drivers or an OS that is not signed by a preapproved digital certificate.

A

Boot attestation or secure boot

35
Q

______ is an optional feature of UEFI that takes a hash calculation of every element involved in the booting process.

A

Measured boot

36
Q

____ are code objects sent from a server to a client to perform some action.

A

Applets

37
Q

The temporary storage of files downloaded from internet sites that are being held by the client’s utility (typically a browser) for current and possibly future use.

A

Temporary internet files or the internet files cache

38
Q

A _____ is used to spread or distribute network traffic load across several network links or network devices.

A

load balancer

39
Q

______ technologies are networking and distributed application solutions that share tasks and workloads among peers.

A

Peer-to-peer (P2P)

40
Q

A ____ is a collection or ledger of records, transactions, operations, or other events that are verified using hashing, timestamps, and transaction data.

A

blockchain

41
Q

______ systems are computing platforms designed to perform complex calculations or data manipulations at extremely high speeds.

A

High-performance computing (HPC)

42
Q

An HPC solution is composed of three main elements: _____ resources, _____ capabilities, and _____ capacity.

A

compute, network, storage

43
Q

A ______ is designed to process or handle data as it arrives on the system with minimal latency or delay.

A

real-time operating system (RTOS)

44
Q

______ is a derivative of IoT that focuses more on industrial, engineering, manufacturing, or infrastructure level oversight, automation, management, and sensing.

A

Industrial Internet of Things (IIoT)

45
Q

______ is a philosophy of network design where data and the compute resources are located as close as possible in order to optimize bandwidth use while minimizing latency.

A

Edge computing

46
Q

A _____IT environment is any system that is intended to remain unchanged by users and administrators.

A

static

47
Q

_______ systems include the check-in kiosk at the airport, an ATM, and often the complimentary guest computer at a hotel or library.

A

static

48
Q

_______ devices include smartphones, mobile phones, tablets, smart TVs, set-top boxes, or an HDMI-stick streaming-media player

A

Network-enabled

49
Q

A ______ is something used to enclose or contain something else. Wrappers are well known in the security community in relation to Trojan horse malware.

A

wrapper

50
Q

A ____ constructs new applications or functions out of existing but separate and distinct software services. The resulting application is often new; thus, its security issues are unknown, untested, and unprotected.

A

service-oriented architecture (SOA)

51
Q

A type___ hypervisor is a native or bare-metal hypervisor. In this configuration, there is no host OS; instead, the hypervisor installs directly onto the hardware where the host OS would normally reside.

A

1

52
Q

A type ____ hypervisor is a hosted hypervisor. In this configuration, a standard regular OS is present on the hardware, and then the hypervisor is installed as another software application.

A

2

53
Q

____ refers to the flexibility of virtualization and cloud solutions to expand or contract resource utilization based on need.

A

Elasticity

54
Q

_____ occurs when an organization deploys numerous virtual machines without an overarching IT management or security plan in place.

A

VM sprawl

55
Q

_____ occurs when software within a guest OS is able to breach the isolation-protection provided by the hypervisor in order to violate the container of other guest OSs or to infiltrate a host OS.

A

VM escaping

56
Q

______ is the ability of a mobile device to include details about its location in any media created by the device, such as photos, videos, and social media posts.

A

Geotagging

57
Q

______ management is a device-management solution that limits which applications can be installed onto a device.

A

application

58
Q

______ is a security option that prohibits unauthorized software from being able to execute. It prevents any and all software, including malware, from executing unless it’s on the preapproved exception list

A

whitelisting

59
Q

_____ is the activity of sharing the cellular network data connection of a mobile device with other devices. This is also known as a hotspot

A

Tethering

60
Q

_______ requires that the OS provide separate memory spaces for each process’s instructions and data.

A

Process isolation

61
Q

A ______ is a method that is used to pass information over a path that is not normally used for communication.

A

covert channel

62
Q

A ______ is malware that embeds itself deep within an OS.

A

rootkit

63
Q

______ occurs when an attacker gains access to a system and makes small, random, or incremental changes to data during storage, processing, input, output, or transaction rather than obviously altering file contents or damaging or deleting entire files.

A

Data diddling