Domain 3 set 3 Flashcards

1
Q

The Main stream Security Mode is ?

A

Clark-Wilson

NON-DOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the Down Data’s Dirty is what Security Mode?

A

BIBA Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Integrity Axiom means what?
A

NO Write UP

BIBA Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Processor Functions in What Ring?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Ring is the User Mode in?

A

Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Ring is the Privileged Mode in?

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 5 types of CPU executions?

A
  1. Multi programming (windows 3.1)
  2. Multitasking
  3. Multitheading
  4. Multiprocessing
  5. Multi-core processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Two types of Multitasking?

A

Cooperative

Preemptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cooperative Multitasking does not do what?

A

no isolation of the individual processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Very high speed memory used for storage by the CPU is called?

A

Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Execution or CPU Cycle is when?

A

The Control Unit and ALU performs the mathematical or logical operations on the DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used by the Processor to keep track of which instruction code have been processed and what ones will be processed next

A

Instruction Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CPU Fetch?

A

When the Control unit gets the instructions from the System Memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 4 CPU cycles?

A
  1. Fetch
  2. Decode
  3. Execute
  4. Store
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCB ?

A

Trusted Computer BaseIt secures the cpu, memory, OS Kernel and Firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It Delineates the trusted and untrusted components within a computer system

A

Security Perimeter

*** It Isolates the TCB

17
Q

Isolates the Trusted Computer Base (TCB)?

A

Security Perimeter

18
Q

Security Kernel

A

The EnforcerEnforces the Reference Monitor Concept

19
Q

performs the mathematical or logical operations on the DATA it gets from memory

A

ALU

20
Q

What are the 3 Elements of the Trusted Computer Base (TCB)

A
  1. Security Perimeter
  2. Reference Monitor
  3. Security Kernel
21
Q

Is an Abstract Machine concept that mediate ALL access between SUBJECTS and OBJECTS

A

Reference MonitorTHE Rules

22
Q

Windows 10 Falls under what TCSEC Level

A

C

23
Q

the operation Mode that use a Reference Monitor to control Access?

A

Multilevel

24
Q

Operation Mode that enforces an AIRGAP

A

Dedicated

25
Q

Which Security Feature prevents an Covert Channel?

A

NON Interference

26
Q

Called the Orange Book

A

TCSECTrusted Computer System Evaluation Criteria

27
Q

TCSEC

A

Trusted Computer System Evaluation Criteria

28
Q

NO Read Down and No Write UP, is what Security Model?

A

BIBA Model

29
Q

What Model uses ALPHA, BETA GAMMA

A

The Lattice-Based Access Controls

30
Q

What security model does not prevent unauthorized alterations of High-Level Data?

A

Bell-Lapadula Model

31
Q

NO READ UP and NO Write DOWN is what Security Model?

A

Bell-Lapadula Model

32
Q

what Security Model protects Confidentialy?

A

Bell-Lapadula Model