CISSP Flashcards
Master Your CISSP
How does the operating systems manages Process functionalities?
It Manages process functionalities through the use of Priority. Some critical processes cannot afford to have their functionality interrupted by another process. The operating system is responsible for setting the priorities for the different processes. When one process needs to interrupt another process, the operating system compares the priority levels of the two processes to determine if this interruption should be allowed
A program that has been developed to carry out several different tasks at one time (display, print, interact with other programs) is capable of running several different threads simultaneously. An application with this capability is referred to as ____________
a multi-threaded application
It is critical that more than one process does not attempt to read and write to these items at the same time. Why is that?
To ensures that programs do not corrupt each other’s data held in memory.
Integrity is dependent on confidentiality. Without confidentiality, integrity cannot be maintained. What are the Other concepts, conditions, and aspects of integrity:
the Other aspects of integrity include accuracy, truthfulness, authenticity, validity, nonrepudiation, accountability, responsibility, completeness, and comprehensiveness.
What is Time Multiplexing?
Time multiplexing is a technology that allows processes to use the same resources.
What is the relationship between system complexity and security?
As the complexity of our systems increases, the potential of truly securing them decreases. There is an inverse relationship between complexity and security: as one goes up, the other one usually goes down. But
this fact does not necessarily predict doom and gloom; what it means is that software architecture and development has to be done in a more disciplined manner.
What are the goals of memory management?
The goals of memory management are to
• Provide an abstraction level for programmers
• Maximize performance with the limited amount of memory available
• Protect the operating system and applications loaded into memory
____ a set of functions that applications can call upon to carry out different types of procedures.
Dynamic Link Library DLL - For example, the Windows operating system has a crypt32.dll that is used by the operating system and applications for cryptographic functions.
____ a set of functions that applications can call upon to carry out different types of procedures.
Dynamic Link Library DLL - For example, the Windows operating system has a crypt32.dll that is used by the operating system and applications for cryptographic functions.
What are the issues associated with Memory Protection Issues?
- Every address reference is validated for protection.
- Two or more processes can share access to the same segment with potentially different access rights.
- Different instruction and data types can be assigned different levels of protection.
- Processes cannot generate an unpermitted address or gain access to an unpermitted segment
Provide a Scenario where virtual memory management could be manipulated by Hackers.
f a program, file, or data is encrypted and saved on the hard drive, it will be decrypted when used by the controlling program. While this unencrypted data is sitting in RAM, the system could write out the data to
the swap space on the hard drive in its unencrypted state. This is also true for secret and private keys being held in RAM. Attackers have figured out how to gain access to this space in unauthorized manners.
I/O devices are usually considered block or character devices True/False
True
The CPU Provides a ring structure architecture
True the CPU provides the ring structure architecture, and the operating system assigns its processes to the different rings.
When can a process have access to resources in a nonrestrictive manner?
When a process is placed in ring 0, its activities are carried out in kernel mode, which means it can access the most critical resources in a nonrestrictive manner.
Attackers have found many ways around Ring protection scheme and have tricked operating systems into loading their malicious code into ring 0, which is very dangerous. Agree?
Yes i agree; Attackers have fooled operating systems by creating their malicious code to mimic system-based DLLs, loadable kernel modules, or other critical files. The operating system then loads the malicious code into ring 0, and it runs in kernel mode. At this point the
code could carry out almost any activity within the operating system in an unprotected manner.