Domain 6 - Security Architecture and Design Flashcards
- Which of the following is not a function of the System Resource Manager as pertaining to Systems Architecture?
a. It allocates CPU
b. It allocates main storage
c. It allocates input/output devices to user programs
d. It allocates user group memberships
Explanation: Answer d is correct, as this is human administrator function and not one performed by the Operating System. Answers a, b and c are a valid functions and are therefore incorrect.
- Which of the following storage mediums is regarded as the most secure against unauthorized erasure?
a. Floppy Disks
b. Virtual Memory
c. Optical Disks
d. On-board Hard Disks
Explanation: Answer c is correct since optical disks cannot be erased. Answer a is incorrect since floppy disks are erasable at any time. Answer b is incorrect as virtual memory is volatile. Answer d is incorrect because hard disk erase protection is achieved through system control not by the medium itself.
- The protection mechanisms within a computing system that collectively enforce security policy are known as the TCB. What does this acronym represent?
a. Terminal Connection Board
b. Trusted Computing Base
c. Trusted Connection Boundary
d. Trusted Cipher Base
Explanation: Answer b is the correct answer. Answers a, c and d are simply fictitious terms and are therefore incorrect.
- Which of the following best describes the security provided by process isolation in distinct address space?
a. It ensures processes running concurrently will not interfere with each other by accident or design
b. It ensures that every process executed has a unique address in memory
c. It ensures a computer user can access only one process at a time
d. It ensures that an executing process cannot communicate with any other process
Explanation: Answer a is correct since process isolation ensures processes cannot affect instructions by writing to each other’s memory. Answer b is a reasonable definition of Process Isolation but doesn’t explain its benefit. Answer c is a false statement. Answer d is a false statement.
- Which Operating System Utility interprets source code without producing an object program available for security audit?
a. Print monitor
b. Interpreter
c. Symbolic addresses
d. Compiler
Explanation: Answer b is correct. Answers a and c do not interpret source code. Answer d interprets source code but produces an auditable object.
- Pertaining to Systems Architecture the process of controlling subject access to system resources is?
a. Software mediation
b. Hardware mediation
c. Software isolation
d. Hardware isolation
Explanation: Answer a is the correct answer. Answer b is an invented term”. Answer c is the process of separating subjects and objects. Answer d is the process of isolating trusted parts of the system from untrusted.
- Which of the following is not a defined mode of access in the Bell-LaPadula model?
a. Read only
b. Write only
c. Read and Write
d. Execute
Explanation: Answer d is correct because Bell LaPadula has only three modes as in a, b, and c above. Answers a, b and c are valid and are therefore incorrect.
- The acronym ITSEC represents
a. Information Technology Security Evaluation Criteria
b. Information Transfer Systems Evaluation Criteria
c. Internationally Tested Security Evaluation Certificate
d. Information Technology Systems Evaluation Certificate
Explanation: Answer a is the correct answer. Answers b, c and d are merely fictitious terms.
- Which of the following is a major component of the Common Criteria Standard?
a. User Profile
b. Protection Profile
c. Desktop Profile
d. Network Profile
Explanation: Answers a and c are system specific. Answer b is correct. Answer d is a fictitious term.
- Under ITSEC evaluation, what assurance class represents inadequate assurance that the target of evaluation has met its requirements?
a. E0
b. E1
c. E2
d. E3
Explanation: Answer a is the correct answer. Answer b meets requirements to the minimum assurance level. Answer c meets requirements to a higher assurance level. Answer d meets requirements to a higher assurance level
- Which of the following applies to the notion of a specific security policy maintaining a “Secure State” as defined by Bell-LaPadula
a. The policy must define the hierarchy of integrity levels
b. The policy must prevent unauthorized users from making modifications
c. The policy must define logging of subject activity
d. The policy must define the permitted modes of access between subjects and objects
Explanation: Answer d is the correct answer. Answer a Relates to integrity – Bell LaPadula relates to confidentiality. Answer b Relates to integrity – Bell LaPadula relates to confidentiality. Answer c is not contained within the Bell La-Padula model.
- Which of the following is not one of the three integrity goals addressed by the Clark-Wilson model?
a. Prevent unauthorized users from making modifications
b. Prevent unauthorized users from viewing classified objects
c. Prevent authorized users from making improper modifications
d. Maintain internal and external consistency
Explanation: Answer a is a valid integrity goal under the model. Answer b is correct because it is a goal of confidentiality. Answer c is a valid integrity goal under the model. Answer d is a valid integrity goal under the model.
- Within an Access Control Model, the “Subject” is?
a. The entity which performs an action
b. The entity which is acted upon
c. The user account
d. The program
Explanation: Answer a is the correct answer. Answer b is the object. Answer c may be true but subjects are not limited to user entities. Answer d may be true but subjects are not limited to program entities
- Which of the following represents a Star Property in the Bell-LaPadula model?
a. Subject cannot read upwards to an object of higher secrecy classification
b. Subject cannot write upwards to an object of higher secrecy classification
c. Subject cannot write downwards to an object of lower secrecy classification
d. Subject cannot read or write upwards or downwards to an object outside of their own secrecy classification
Explanation: Answer a would represent a “Simple Security Property”. Answer b would represent a “Strong Star Property”. Answer c is correct – “No Write Down”. Answer d would represent a “Strong Star Property”
- Which of the following best describes the principle of hardware segmentation as it relates to systems architecture?
a. Machines are stored in different physical locations
b. Disks are split into multiple logical drive letters
c. Virtual memory is divided into segments
d. Computers are given unique IP addresses
Explanation: Answer a is not relevant to operating systems architecture. Answer b is not relevant to operating systems architecture. Answer c is the correct answer since user processes cannot access segments restricted to system use. Answer d is not relevant to operating systems architecture.