Chapter 9 Security Vulnerabilities, Threats, and Countermeasures Flashcards

1
Q

permits multiple concurrent tasks to be performed within
a single process

Multitasking
Multiprocessing
Multiprogramming
Multithreading

A

Multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computing system harnesses the power of more than one processor to complete the execution of a single application

Multitasking
Multiprocessing
Multiprogramming
Multithreading

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

multiple tasks occupy multiple processes

Multitasking
Multiprocessing
Multiprogramming
Multithreading

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multitasking
Multiprocessing
Multiprogramming
Multithreading

A

Multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When multiple documents are opened at the

same time in a word processing program it is an example of _____ thread(s) within _________ process(es).

A

multiple , single

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A single computer contains multiple processors that are treated equally and controlled by a single operating system is ______.

symmetric multiprocessing
massively parallel processing

A

symmetric multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

systems house hundreds or even thousands of processors, each
of which has its own operating system and memory/bus resources

massively parallel processing
symmetric multiprocessing

A

massively parallel processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Systems certified to handle multiple security levels simultaneously by using specialized security mechanisms

A

Multistate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

security administrators approve a processor and system to handle only one security level at a time

A

Single-state system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a process finishes or must be terminated (because an error occurs, a
required resource is not available, or a resource request can’t be met

Ready
Waiting
Running
Supervisory
Stopped
A

Stopped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

when the process must perform an action that requires privileges that are greater than the problem state’s set of privileges, including modifying system
configuration, installing device drivers, or modifying security settings.

Ready
Waiting
Running
Supervisory
Stopped
A

Supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

process executes on the CPU and keeps going until it finishes, its time slice expires, or it is blocked for some reason

Ready
Waiting
Running
Supervisory
Stopped
A

Running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the process is ready for continued execution but is waiting for a device or access request (an interrupt of some kind) to be serviced before it can continue processing

Ready
Waiting
Running
Supervisory
Stopped
A

Waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a process is ready to resume or begin processing as soon as it is scheduled for execution.

Ready
Waiting
Running
Supervisory
Stopped
A

Ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If the time slice ends and the process isn’t completed, it returns to the ____ state

Ready
Waiting
Running
Supervisory
Stopped
A

ready

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

if the process blocks while waiting for a resource to become available, it goes into the _____ state

Ready
Waiting
Running
Supervisory
Stopped
A

waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

■ Each user must have a security clearance that permits access to all information processed
by the system.

■ Each user must have access approval for all information processed by the system.

■ Each user must have a valid need to know for all information processed by the system.

Dedicated Mode
System High Mode
Compartmented mode
Multilevel Mode

A

Dedicated Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

■ Each user must have a valid security clearance that permits access to all information
processed by the system.

■ Each user must have access approval for all information processed by the system.

■ Each user must have a valid need to know for some information processed by the
system but not necessarily all information processed by the system.

Dedicated Mode
System High Mode
Compartmented mode
Multilevel Mode

A

System High Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

■ Each user must have a valid security clearance that permits access to all information
processed by the system.

■ Each user must have access approval for any information they will have access to on the system.

■ Each user must have a valid need to know for all information they will have access to on the system.

Dedicated Mode
System High Mode
Compartmented mode
Multilevel Mode

A

Compartmented mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

■ Some users do not have a valid security clearance for all information processed by the system. Thus, access is controlled by whether the subject’s clearance level dominates the object’s sensitivity label.

■ Each user must have access approval for all information they will have access to on the system.

■ Each user must have a valid need to know for all information they will have access to
on the system.

Dedicated Mode
System High Mode
Compartmented mode
Multilevel Mode

A

Multilevel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a nonvolatile form of storage media that can be electronically erased and rewritten and must be fully erased to be rewritten

Programmable Read-Only Memory (PROM)

Erasable Programmable Read-Only Memory (EPROM)

Electronically Erasable Programmable Read-Only Memory (EEPROM)

Flash Memory

A

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

uses electric voltages delivered to the pins of the chip to force erasure and
chips can be erased without removing them from the computer

Programmable Read-Only Memory (PROM)

Erasable Programmable Read-Only Memory (EPROM)

Electronically Erasable Programmable Read-Only Memory (EEPROM)

Flash Memory

A

Electronically Erasable Programmable Read-Only Memory (EEPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

requires the physical removal of the chip from the computer and exposure to a special kind of ultraviolet
light.

Programmable Read-Only Memory (PROM)

Erasable Programmable Read-Only Memory (EPROM)

Electronically Erasable Programmable Read-Only Memory (EEPROM)

Flash Memory

A

Erasable Programmable Read-Only Memory (EPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

incorporates special functionality that allows an end user to burn in the chip’s contents later

Programmable Read-Only Memory (PROM)

Erasable Programmable Read-Only Memory (EPROM)

Electronically Erasable Programmable Read-Only Memory (EEPROM)

Flash Memory

A

Programmable Read-Only Memory (PROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

typically the largest RAM storage resource available to a computer

Real Memory
Registers
Cache RAM

A

Real Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

improve performance by taking data from slower devices and temporarily storing it in faster
devices when repeated use is likely

Real Memory
Registers
Cache RAM

A

Cache RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

onboard memory that provides directly accessible memory locations that the brain of the CPU, the arithmeticlogical unit (ALU), uses when performing calculations or processing instructions.

Cache RAM
Registers

A

Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

means of referring to various

locations in memory

A

Memory Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The address must be located on the same memory page as the
instruction being executed.

Register Addressing
Base+Offset Addressing
Immediate Addressing
Direct Addressing
Indirect Addressing
Immediate Addressing
A

Direct Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

the memory address supplied to the CPU as part of the instruction doesn’t contain the actual value that the CPU is to use as an operand. Instead, the memory address contains another memory address

Register Addressing
Base+Offset Addressing
Immediate Addressing
Direct Addressing
Indirect Addressing
Immediate Addressing
A

Indirect Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When the CPU needs information from one of its registers to complete
an operation, it uses a ____ (for example, “register 1”) to access its contents.

Register Addressing
Base+Offset Addressing
Immediate Addressing
Direct Addressing
Indirect Addressing
Immediate Addressing
A

Register Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

uses a value stored in one of the CPU’s registers as the base location from which to begin counting.

Register Addressing
Base+Offset Addressing
Immediate Addressing
Direct Addressing
Indirect Addressing
Immediate Addressing
A

Base+Offset Addressing

33
Q

a way of referring to data that is supplied to the CPU as part of an instruction.

Register Addressing
Base+Offset Addressing
Immediate Addressing
Direct Addressing
Indirect Addressing
Immediate Addressing
A

Immediate Addressing

34
Q

a term commonly used to refer to magnetic, optical, or flash-based media or other storage devices that contain data not immediately available to the CPU.

Virtual memory
Secondary memory
Primary memory

A

Secondary memory

35
Q

_______ is a special type of secondary memory that the operating system manages to make look and act just like real memory.

Virtual memory
Secondary memory
Primary memory

A

Virtual memory

36
Q

To store data, ______ uses a series of capacitors, tiny electrical devices that hold a charge.

dynamic RAM
Static RAM

A

dynamic RAM

37
Q

_______ uses more sophisticated technology—a logical device known as a flip-flop, is simply an on/off switch that must be moved from one position to another to change a 0 to 1 or vice versa.

dynamic RAM
Static RAM

A

Static RAM

38
Q

______ means
that there are often blocks of data that are not marked as “live” but that hold a copy of the data when it was copied off to lower wear leveled blocks.

A

SSD wear leveling

39
Q

the electronic emanations that every monitor produces is known as

A

Van Eck radiation

40
Q

allows the electronic emanations that every monitor produces to be read from a distance

A

this process is known

as Van Eck phreaking

41
Q

____ is a technology that allows the electronic emanations that every monitor produces (known as Van Eck radiation ) to be read

A

TEMPEST

42
Q

a channel with two signal lines, where one line is a DMA request (DMQ) line and the other is a DMA
acknowledgment (DACK) line.

Memory-Mapped I/O
Interrupt (IRQ)
Direct Memory Access (DMA)

A

Direct Memory Access (DMA)

43
Q

part of the address space that the CPU manages
functions to provide access to some kind of device through a series of mapped memory addresses or locations

Memory-Mapped I/O
Interrupt (IRQ)
Direct Memory Access (DMA)

A

Memory-Mapped I/O

44
Q

a technique
for assigning specific signal lines to specific devices through a special interrupt controller.

Memory-Mapped I/O
Interrupt (IRQ)
Direct Memory Access (DMA)

A

Interrupt (IRQ)

45
Q

In most computers, the BIOS is stored on an _____ chip

A

EEPROM

46
Q

There is also an attack known as ______, in which a malicious variation of official BIOS or firmware is installed that introduces remote control or other malicious features into a
device.

A

phlashing

47
Q

What are the two elements that are compromised in a client based attack ?

A

Applets and local caches

48
Q

code objects are
sent from a server to a client to perform some action

Applets
local caches

A

Applets

49
Q

self-contained
miniature programs that execute independently of the server that sent them.

Applets
local caches

A

Applets

50
Q

caused by an attack responding to ARP broadcast queries in

order to send back falsified replies

A

ARP cache poisoning

51
Q

To combine records from one or more tables to produce potentially useful information is called ________.

aggregation
inference
data mining

A

Aggregation

52
Q

combining several pieces of nonsensitive
information to gain access to information that should be classified at a higher level.

aggregation
inference
data mining

A

Inference

53
Q

commonly used for storing critical information about data, including
usage, type, sources, relationships, and formats. DBMS software reads the data dictionary to determine access rights for users attempting to access data.

aggregation
inference
data mining
data dictionary

A

data dictionary

54
Q

What is stored in a datamart ?

A

metadata

55
Q

providing a computing platform and software solution stack as a virtual or cloud-based service.

Platform-as-a-Service
Software-as-a-Service (SaaS)
Infrastructure-as-a-Service

A

Platform-as-a-Service

56
Q

provides on-demand online access to specific software applications or suites without the need for local installation

Platform-as-a-Service
Software-as-a-Service (SaaS)
Infrastructure-as-a-Service

A

Software-as-a-Service (SaaS)

57
Q

utility or metered computing services, administrative
task automation, dynamic scaling, virtualization services, policy implementation and management
services, and managed/filtered Internet connectivity

Platform-as-a-Service
Software-as-a-Service (SaaS)
Infrastructure-as-a-Service

A

Infrastructure-as-a-Service

58
Q

_____ refer to devices that offer a computational means to control
something in the physical world

Cyber-physical systems
Network-enabled devices
embedded system

A

Cyber-physical systems

59
Q

any type of portable or nonportable device that has native network capabilities.

Cyber-physical systems
Network-enabled devices
embedded system

A

Network-enabled devices

60
Q

______ is a computer implemented as part of a larger system.

Cyber-physical systems
Network-enabled devices
embedded system

A

embedded system

61
Q

the collection of devices that can communicate over the Internet with one another or with a control console in order to affect and monitor the real world.

A

Internet of Things (IoT).

62
Q

doctrine that says that users of an object (or operating system component) don’t necessarily need to know the details of how the object works; they need to know just the proper syntax for using the object and the type of data that will be
returned as a result (that is, how to send input and receive output).

A

Abstraction

63
Q

abstraction applies to security is in the introduction of object groups, sometimes called _____ , where access controls and operation rights are assigned to
groups of objects rather than on a per-object basis

A

classes

64
Q

puts the most sensitive functions of a process at the core, surrounded by a series of increasingly larger concentric circles with correspondingly lower sensitivity levels

A

Layering

65
Q

placing objects in security containers that are different from those that subjects occupy
to hide object details from those with no need to know about them.

A

Data Hiding

66
Q

A _______ presents a user
or process with a processing environment—including memory, address space, and other key system resources and services—that allows that user or process to behave as though they have sole, exclusive access to the entire computer.

A

virtual machine

67
Q

_______ requires that the operating system provide separate memory spaces for each process’s instructions and data.

A

Process Isolation

68
Q

______ prevents the

access of information that belongs to a different process/security level through physically separating components.

A

Hardware Segmentation

69
Q

A _______ a method that is used to pass information over a path that is not normally used for communication.

A

covert channel

70
Q

________ conveys information by altering the
performance of a system component or modifying a resource’s timing in a predictable manner.

Covert Timing Channel
Covert Storage Channel

A

Covert Timing Channel

71
Q

A _____ conveys information by writing data
to a common storage area where another process can read it.

Covert Timing Channel
Covert Storage Channel

A

Covert Storage Channel

72
Q

the type of attack that results when someone attempts to supply malicious instructions or code as part of program input is called a _______.

A

buffer overflow

73
Q

The party responsible for a buffer overflow vulnerability is always the _______ .

A

programmer

74
Q

systematic whittling at assets in accounts or other records with financial value, where
very small amounts are deducted from balances regularly and routinely

Maintenance Hooks
Data diddling
salami attack

A

salami attack

75
Q

entry points into a system that are known only by the developer of the system.

Maintenance Hooks
Data diddling
salami attack

A

Maintenance Hooks

76
Q

occurs when an attacker gains access to a system and makes small, random,
or incremental changes to data during storage, processing, input, output, or transaction rather than obviously altering file contents or damaging or deleting entire files.

Maintenance Hooks
Data diddling
salami attack

A

Data diddling

77
Q

An ______ constructs new applications or functions out of existing but separate and distinct software services.

A

serviceoriented architecture (SOA)

78
Q

A ______ is a special enclosure that acts as an EM capacitor.

A

Faraday cage