Quiz 2 Material Flashcards

1
Q

Each layer of code needs appropriate hardening measures in place to provide appropriate security services. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is possible for a system to be compromised during the installation process. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The default configuration for many operating systems (OS) usually maximizes security. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A malicious driver can potentially bypass many security controls to install malware T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Many users choose a password that is too short or too easy to guess because it is hard for users to remember long and random passwords

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and the source is authentic T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a biometric scheme some physical characteristics of the individual is mapped into a digital representation T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What needs to be taken into consideration during the system security planning process?

A
  • How users are authenticated
  • The categories of users of the systems
    What access the system has to information stored on other hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which steps should be used to secure an operating system?

A
  1. Test the security of the basic OS
  2. remove unnecessary services
  3. Install and patch the operating system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

A

White Listing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the _____

A

verification step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Recognition by fingerprint, retina, and face are examples of ____

A

static biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Voice pattern, handwriting characteristics, and typing rhythm are examples of ____

A

dynamic biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A

Reactive password checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Each individual who is to be included in the database of authorized users must first be \_\_\_\_ in the system
A. verified
B. Identified
C. Authenticated
D. Enrolled
A

Enrolled

17
Q

When the following is an example of multi-factor authentication
A. Enter both a group password and a user password
B. Enter a pin and put a finger on fingerprint reader
C. Use an authentication token (smartcard)

A

B. Pin and fingerprint reader

18
Q

Threat to or concerns of biometric authentication

A
  1. Inherent imprecision (two people may have their fingerprints digitally interpreted as the same)
  2. Impersonation
  3. Coercion (force user finger on reader)
19
Q

What are the TCB Requirements

A

Complete Mediation
Tamper-proof
Correct

20
Q

What is Complete Mediation

A

Abstract. The between the hardware and untrusted applications.

21
Q

How does the OS protect resources?

A
  1. Authenticates a request for resources
  2. Authorization or access control
  3. uses mechanisms that allow various policies
22
Q

What is an execution ring?

A

Same as an execution level. You can have rings for users, admin, root, etc.

23
Q

Process A can map to a physical page of process B. T/F

A

Technically True, but it would have to be done explicitly. A cannot access B’s memory.