Sample Test Questions Domain 3 Flashcards

1
Q

the ___ is the most widely used standard for evaluating security attributes of computer systems

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With preemptive multitasking, used in Windows 9x and later versions and in Unix systems, the ___ controls how long a process can use a resource

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security issue with using virtual swap space is that ___

A

two or more processes use the same resource and the data could be corrupted or compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The reference monitor is an access control concept that is implemented and enforced by the ___ via the hardware, software, and firmware

A

security kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ takes place when a CPU needs to move between executing instructions for a highly trusted process to a less trusted process or vice versa.

A

Execution domain switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ___ model addresses how access rights between subjects and objects are defined, developed, and integrated

A

Graham-Denning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ___ is a countermeasure against memory leaks. It is software that runs an algorithm to identify unused committed memory and then tells the operating system to mark that memory as “available.”

A

garbage collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The memory manager has five basic responsibilities:

A
  1. protection
  2. sharing
  3. relocation
  4. local organization
  5. physical organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the Common Criteria begins with a ___, which contains the set of security requirements, their meaning and reasoning, and the corresponding EAL rating that the intended product will require.
The ___, is the actual product that is being evaluated against the Common Criteria.
The ___ is the vendor’s written explanation of the security functionality and assurance mechanisms that meet the needed solution

A

Protection Profile;
target of evaluation (ToE);
security target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ has the goal of internationally standardizing the use of system architecture so that product developers don’t have to improvise and come up with their own individual approaches

A

ISO/IEC 42010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___ programming language is susceptible to buffer overflow attacks because some of its commands allow for direct pointer manipulations to take place

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the ___ architecture, a reduced amount of code is running in kernel mode carrying out critical operating system functionality

A

microkernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___ is when the CPU has to change from processing code in user mode to kernel mode. This is a protection measure, but it causes a performance hit because all of the information on the new process has to be loaded into the registers for the CPU to work with

A

mode transition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ and ___ can be used to ensure a clean and smooth distribution of power

A

Voltage regulators; line conditioners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The goal of ___ is to make criminals feel uncomfortable by providing many ways observers could potentially see them and to make all other people feel safe and comfortable, by providing an open and well-designed environment

A

natural surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Class D fires mean something ___ is on fire

A

metal (or “medal”)

17
Q

The ___ category of security controls in a physical security program pertains to how various situations will be assessed, triaged, and dealt with

A

assessment

18
Q

When a heavy electrical device is turned on, it can draw a large amount of current, which is referred to as ___

A

in-rush current

19
Q

in steganography, The ___ is a signal, data stream, or file that has hidden information (the payload) inside of it, the ___ is the file format in which the information is hidden

A

carrier; stegomedium

20
Q

in a PKI system, the ___ confirms the individual’s identity, and the ___ creates, maintains and signs the digital certificate

A

RA (Registration Authority); CA (Certificate Authority)

21
Q

in Trusted Platform Module implementation, ___ a hard disk drive is where the decryption key that can be used to decrypt data on the drive is stored on the TPM. ___ is when data pertaining to the system’s state is hashed and stored on the TPM, enabling verification of the hardware and software configuration.

A

“Binding”; “sealing”

22
Q

MACs are a result of hashing a message, whereas HMACs are a result of hashing both the message and ___, which provides some authentication but not the non-repudiation of a digital signature

A

a shared secret key

23
Q

in distributed systems, smaller intermediate distribution facilities (IDFs) and storage facilities are commonly less well protected physically even though they ___

A

contain data as critical as the data in main distribution facilities (MDFs) and data centers