Practice test Flashcards
The Brewer-Nash model
Chinese wall-Conflicts of interest pertain to accessing company-sensitive information from different companies that are in direct competition with one another
The Digital Signature Standard approves three encryption algorithms for use in digital signatures
the Digital Signature Algorithm (DSA); the Rivest, Shamir, Adleman (RSA) algorithm; and the Elliptic Curve DSA (ECDSA) algorithm.
In the subject/object model of access control, the user or process making the request for a resource is the …..of that request. In this example, Harry is requesting resource access and is, therefore, the subject.
subject
The use of a sandbox is an example of ……
confinement
What concept describes the degree of confidence that an organization has that its controls satisfy security requirements
Assurance
The Simple Integrity Property
states that an individual may not read a file classified at a lower security level than the individual’s security clearance.
The Trusted Platform Module (TPM)
is a hardware security technique that stores an encryption key on a chip on the motherboard and prevents someone from accessing an encrypted drive by installing it in another computer.
A preaction fire suppression system activates in two steps.
The pipes fill with water once the early signs of a fire are detected. The system does not dispense water until heat sensors on the sprinkler heads trigger the second phase.
The *-Security Property
The *-Security Property states that an individual may not write to a file at a lower classification level than that of the individual. This is also known as the confinement property
The Diffie-Hellman algorithm allows
allows for the secure exchange of symmetric encryption keys over a public network.
Protection Profiles (PPs) specify the ……… and protections that must be in place for a product to be accepted under the ….
security requirements &Common Criteria.
……. says that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Kerckhoff’s principle
The *-Integrity Property
states that a subject cannot modify an object at a higher integrity level than that possessed by the subject.
Covert channel
A method used to pass information over a path not normally used for communication.
Time of use:
The time at which a subject can access an object.
Parameter checking
A method that can help prevent buffer overflow attacks.
Race condition
The exploitation of difference between time of check and time of use.
The Ready state is used when
a process is prepared to execute but the CPU is not available
The Running state
is used when a process is executing on the CPU
The Waiting state
is used when a process is blocked waiting for an external event.
The Stopped state is
s used when a process terminates
EAL1 evaluation assurance level under the Common Criteria
EAL1 assurance applies when the system in question has been functionally tested. It is the lowest level of assurance under the Common Criteria.
Multistate systems
are certified to handle data from different security classifications simultaneously by implementing protection mechanisms that segregate data appropriately.
The verification process is similar to the certification process in that it validates security controls
Verification may go a step further by involving a third-party testing service and compiling results that may be trusted by many different organizations. Accreditation is the act of management formally accepting an evaluating system, not evaluating the system itself.
Process … ensures that any behavior will affect only the memory and resources associated with a process.
isolation
Class A fire extinguishers
are useful only against common combustible materials
Class B extinguishers are
are for liquid fires.
Class C extinguishers
are for electrical fires
Class D fire extinguishers
are for combustible metals.
The TEMPEST program
reates technology that is not susceptible to Van Eck phreaking attacks because it reduces or suppresses natural electromagnetic emanations.
Trusted Computing Base
is a small subset of the system contained within the kernel that carries out critical system activities.
What physical security control broadcasts false emanations constantly to mask the presence of true electromagnetic emanations from computing equipment
White noise
Multithreading
permits multiple tasks to execute concurrently within a single process. These tasks are known as threads and may be alternated between without switching processes.
Heartbeat sensors
send periodic status messages from the alarm system to the monitoring center. The monitoring center triggers an alarm if it does not receive a status message for a prolonged period of time, indicating that communications were disrupted.
Soda acid and other dry powder extinguishers work to remove the….
fuel supply
While halon and carbon dioxide remove the … supply from a fire.
oxygen
The of a ….of the limits set on the memory addresses and resources that the process may access.
bounds
….. motion detectors monitor the electromagnetic field in a monitored area, sensing disturbances that correspond to motion.
Capacitance
The …… is responsible for coordinating access to physical hardware and enforcing isolation between different virtual machines running on the same physical platform
hypervisor
The …model of composition theory occurs when one system provides input for a second system and then the second system provides input for the first system. This is a specialized case of the cascading model, so the feedback model is the most appropriate answer.
feedback
Data center humidity should be maintained between …and …. Values below this range increase the risk of static electricity, while values above this range may generate moisture that damages equipment.
40% and 60%
……uses a black box approach to hide the implementation details of an object from the users of that object.
Abstraction
Capability tables list the ……assigned to subjects and identify the objects that …… can access
privileges subjects
Access control lists….
are object-focused rather than subject-focused.
OAuth
is used to log into third-party websites using existing credentials
During the Kerberos authentication process, the steps take place in the following order
E. User provides authentication credentials C. Client/TGS key generated B. TGT generated A. Client/server ticket generated D. User accesses service
A …….is a transitive trust between parts of a domain tree or forest that shortens the trust path
shortcut trust
a …….is a transitive trust between two forest root domains,
forest trust
an … is a nontransitive trust between AD domains in separate forests.
external trust
Kerberos, Active Directory Federation Services (ADFS), and Central Authentication Services (CAS) are all ….implementations
SSO
When the owner of a file makes the decisions about who has rights or access privileges to it, they are using …….access control
discretionary
….controls would grant access based on a subject’s role
Role-based access
….. access controls apply a fixed set of rules to an environment to manage access. …. access controls include rule-, role-, and lattice-based access controls.
Nondiscretionary
Mandatory access control systems are based on a ……
lattice-based model.
….. is an AAA protocol used to provide authentication and authorization; it’s often used for modems, wireless networks, and network devices
RADIUS
…. is the Extensible Authentication Protocol, an authentication framework often used for wireless networks.
EAP
……..access controls match permissions to resources like a storage volume. Resource-based access controls are becoming increasingly common in cloud-based infrastructure as a service environments
Resource-based
By default, RADIUS uses …… and only encrypts passwords. RADIUS supports TCP and TLS, but this is not a default setting
UDP
…. occurs when users retain from roles they held previously rights they do not need to accomplish their current job
Privilege creep
…… occur when two or more processes need to access the same resource in the right order.
Race conditions
….. is a CPU architecture feature that allows the use of otherwise unused cycles,
out-of-order execution
The stored sample of a biometric factor is called a …….
reference profile or a reference template
……., is an XML-based language designed to allow platforms to generate and respond to provisioning requests
Service Provisioning Markup Language, or SPM
… is used to make authorization and authentication data
SAML
….. is used to describe access controls.
XACML
…. is a messaging protocol and could be used for any XML messaging but is not a markup language itself
SOAP, or Simple Object Access Protocol,
….. series of standards covers directory services.
The X.500
By default, in what format does OpenLDAP store the value of the user Password attribute
In the clear
….errors occur when a valid subject is not authenticated
Type 1
… errors occur in biometric systems when an invalid subject is incorrectly authenticated as a valid user
Type 2
….is the process of determining what a user is allowed to do
Authorization
When you input a username and password, you are ….. yourself by providing a unique identifier and a verification that you are the person who should have that identifier (the password)
authenticating
…… is the eXtensible Access Control Markup Language, not a type of attack
XACML
……… authentication relies on facts or data that the user already knows that can be used to create questions they can answer on an as-needed basis (for example, a previous address, or a school they attended).
Dynamic knowledge-based
……… relies on an alternate channel like a phone call or text message
Out-of-band identity proofing
…..authentication factors are biometric, or “something you are,” rather than knowledge based.
Type 3
…. are procedures and the policies from which they derive. They are based on regulations, requirements, and the organization’s own policies.
Administrative access controls
…. access controls return an environment to its original status after an issue
Corrective
…. are technical access controls that rely on hardware or software to protect systems and data.
Logical controls
…controls are used in addition to or as an alternative to other controls
Compensating