Security Flashcards

1
Q

What is a virus?

A

a piece of executable code that embeds itself into legitimate programs and copies itself to other programs and systems with the intention of causing harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is mandatory access control (MAC)

A

access control settings enforced in the form of system policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are MAC labels?

A

A label is an identifier (usually a string) assigned to an object (files, devices, and the like). Labels may also be applied to subjects (actors, such as processes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a protection domain?

A

a set of pairs where rights specify what operations a process may perform on the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is an access matrix?

A

a representation of protection domains, where each row corresponds to one domain and each column corresponds to one object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are access lists?

A

the columns or the objects in an access matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are capability lists?

A

the domains or the rows in an access matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cryptography

A

is a technique that allows a sender to transform plaintext into a ciphertext, which the receiver can transform back to the original plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is encryption?

A

the act of transforming plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is message authentication code (MAC)

A

a short bit string attached to a message and used to confirm that the message came from the stated sender and has not been modified in transit. this is basically a digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What most privileged execution environment has exclusive access to hardware-backed cryptographic features

A

TrustZone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When the system boots, it boots into the highest privilege level (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is secure monitor call?

A

an ARM processor special instruction that can be used by the kernel to request services from the TrustZone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a protection domain?

A

specifies which resources that the process may access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is an access right?

A

the ability to execute an operation on an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a collection of access rights is known as?

A

a domain