Domain 3 - Security Architecture & Engineering Flashcards

1
Q

A major strength of this Encryption type is communication between parties previously unknown to eachother

A

Public Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define PKI Hierarchy of Trust Relationships

A

Trust = Permits combining asymmetric + symmetric cryptography to create a hybrid cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Asymmetric and Symmetric Encryption?

A

Asymmetric uses a key pair. One to encrypt/one to decrypt. It is also not identical on both sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shared Secret is _______ encryption

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a sender uses a shared key to encrypt and the receiver uses the same key to decrypt, what kind of algorithm is this?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The resource a user or process wants to access

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The user or process that makes a request to access a resource

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This Framework uses various levels of testing (EAL) and confirmation of a system’s security capabilities

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Developed to replace ITSEC

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

More flexible than TCSEC

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first attempt at establishing a single standard for evaluating security attributes of computer systems

A

ITSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gov’t Book that Addresses security evaluation topics for Networks and Network Components

A

Red Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? The Red Book states that subjects accessing objects on the network need to be Controlled, Monitored, and Audited?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software designers do this to restrict actions of a program. It allows a process to read from and write to only certain memory locations and resources.

A

Process Confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How could a program that writes to and reads from an area of memory that’s being used by another program violate the 3 tenets of security - CIA?

A

 Confidentiality
• I.e, if the data that’s processing was sensitive or secret, it’s confidentiality is no longer guaranteed
 Integrity
• I.e, if the data is overwritten or altered, there is no guarantee of integrity
 Availability
• If the data modification results in corruption or loss, it could become unavailable for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Limits being set on Memory Addresses and Resources is a process known as setting b_______.

A

Bounds

17
Q

Bounds, similar to boundaries, state the area within which a p______ is confined or contained.

A

Process

18
Q

Describe the difference between Logical Bounds and Physical Bounds

A

Logical - Segment logical areas of memory
Physical - Require every bounded process to run an in area of memory that is physically separated from other bounded processes

19
Q

When a process is confined through enforcing access bounds, that process runs in ________n.

A

Isolation

20
Q

_____ _______ ensures that any behavior will affect only the memory and resources associated with the isolated process

A

Process Isolation

21
Q

Process Isolation is not required for preemtive multitasking, True or False?

A

False - Process Isolation is required for pre emptive multitasking

22
Q

A System that is Always secure no matter what state it is in

Security Models (Computer Architecture and Operating System Design)

A

State Machine Model

23
Q

Define a ‘State’ as it relates to the State Machine Model

A

A snapshot of a system at a specific Moment in Time

24
Q

Which Access Control uses Static Attributes of the Subject and Object

Access Controls - Access Rules

A

MAC

25
Q

Compartmented (Top Secret)
System High Mode
Multilevel Mode (Secret, Top Secret, and Clearance)
and Dedicated Mode are Security Modes in relation to which Access control?

A

MAC

26
Q

With this Access Control, the Subject has some ability to define Objects to Access

Access Control

A

DAC

27
Q

Which Kernel makes up the main component of the TCB?

A

The Security Kernel

28
Q

True or False?

The TCB is made up of Hardware, Software, and Firmware

A

TRU

29
Q

Which two Access Control Models Enforce Integrity?

A

Clark Wilson, Biba

30
Q

Name a specific Military Access Control model that enforces Confidentiality

A

Bell-LaPadula

31
Q

Does Clark Wilson use a Lattice or a 3 part relationship? Such as Subject/Transaction/Object

A

3 Part Relationship

32
Q

True or False - in Clark-Wilson Subjects DO NOT have direct access to Objects?

Objects can only be accessed through programs?

A

True; Objects can only be accessed through programs

33
Q

Bell lapadula addresses confidentiality.

True or false

A

TrUe
Does not address integrity
Keeps secret secret

34
Q

P points down in bell lapadula because ____ down?

A

P reads down