Sample Test Questions Domain 3 Flashcards
the ___ is the most widely used standard for evaluating security attributes of computer systems
Common Criteria
With preemptive multitasking, used in Windows 9x and later versions and in Unix systems, the ___ controls how long a process can use a resource
operating system
A security issue with using virtual swap space is that ___
two or more processes use the same resource and the data could be corrupted or compromised
The reference monitor is an access control concept that is implemented and enforced by the ___ via the hardware, software, and firmware
security kernel
___ takes place when a CPU needs to move between executing instructions for a highly trusted process to a less trusted process or vice versa.
Execution domain switching
The ___ model addresses how access rights between subjects and objects are defined, developed, and integrated
Graham-Denning
A ___ is a countermeasure against memory leaks. It is software that runs an algorithm to identify unused committed memory and then tells the operating system to mark that memory as “available.”
garbage collector
The memory manager has five basic responsibilities:
- protection
- sharing
- relocation
- local organization
- physical organization
the Common Criteria begins with a ___, which contains the set of security requirements, their meaning and reasoning, and the corresponding EAL rating that the intended product will require.
The ___, is the actual product that is being evaluated against the Common Criteria.
The ___ is the vendor’s written explanation of the security functionality and assurance mechanisms that meet the needed solution
Protection Profile;
target of evaluation (ToE);
security target
___ has the goal of internationally standardizing the use of system architecture so that product developers don’t have to improvise and come up with their own individual approaches
ISO/IEC 42010
The ___ programming language is susceptible to buffer overflow attacks because some of its commands allow for direct pointer manipulations to take place
C
In the ___ architecture, a reduced amount of code is running in kernel mode carrying out critical operating system functionality
microkernel
A ___ is when the CPU has to change from processing code in user mode to kernel mode. This is a protection measure, but it causes a performance hit because all of the information on the new process has to be loaded into the registers for the CPU to work with
mode transition
___ and ___ can be used to ensure a clean and smooth distribution of power
Voltage regulators; line conditioners
The goal of ___ is to make criminals feel uncomfortable by providing many ways observers could potentially see them and to make all other people feel safe and comfortable, by providing an open and well-designed environment
natural surveillance