Chapter 9 - Security Vulnerabilities, Threats, and Countermeasures Flashcards

1
Q

Multithread

A

A single-processor system can operate on only one thread at a time. There would be a total of four application threads, but the operating system would be responsible for deciding which single thread is running on the processor at any given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of memory device is usually used to contain a computers motherboard BIOS?

A

BIOS and device firmware are often stored on EEPROM chips to facilitate future firmware updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three types of cloud computering

A

Software as a Service is where applications reside. Remember that raw data and volumes are at the lowest level (IaaS) and files and Application Programming Interfaces (APIs) reside in the platform area (PaaS).

Understanding the relationships and dependencies between cloud computing models is critical to understanding cloud computing security risks.

IaaS is the foundation of all cloud services, with PaaS building upon IaaS, and SaaS in turn building upon PaaS as described in the Cloud Reference Model diagram. In this way, just as capabilities are inherited, so are information security issues and risk. It is important to note that commercial cloud providers may not neatly fit into the layered service models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud computing deployment model

A

https://www.freepracticetests.org/quiz/uploads/images/cloud%20deployment%20models(1).png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Differences between maintenance hook and covert channel

A

A covert channel is an unintended communication path within a system, therefore it is not protected by the system’s normal security mechanisms. Covert channels are a secret way to convey information.
Covert channels are addressed from TCSEC level B2.

A maintenance hook is a hardware or software mechanism that was installed to permit system maintenance and to bypass the system’s security protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly