Security Architecture Flashcards
- What flaw creates buffer overflows?
a. Application executing in privileged mode
b. Inadequate memory segmentation
c. Inadequate protection ring use
d. Insufficient parameter checking
- The answer is D. A buffer overflow takes place when too much data is accepted as input. Programmers should implement the correct security controls to ensure that this does not take place. This means they need to perform bounds checking and parameter checking to ensure only the allowed about of data is actually accepted and processed by the system.
- The operating system performs all except which of the following tasks?
a. Memory allocation -T
b. Input and output tasks -T
c. Resource allocation -T
d. User access to database views -F
- The answer is D. The operating system has a long list of responsibilities, but implementing database views is not one of them. This is the responsibility of the database management software.
- If an operating system allows sequential use of an object without refreshing it, what security issue can arise?
a. Disclosure of residual data
b. Unauthorized access to privileged processes
c. Data leakage through covert channels
d. Compromising the execution domain
- The answer is A. If an object has confidential data and this data is not properly erased before another subject can access it, this left over or residual data can be accessible. This can compromise the data and system’s security by disclosing their confidential information.
- Which of the following best describes a reference monitor?
a. A software component that monitors activity and writes security events to an audit log
b. A software component that determines if a user is authorized to perform a requested operation
c. A software component that isolates processes and separates privilege and user modes
d. A software component that works in the center protection ring and provides interfaces between trusted and un-trusted objects (Security Perimeter)
- The answer is B. A reference monitor is the abstract machine that holds all of the rules of access for the system. The security kernel is the active entity that enforces the reference monitor’s rules. They control the access attempts of any and all subjects; a user is just one example of a subject.
- A security kernel contains which of the following?
a. Software, hardware and firmware (TCB)
b. Software, hardware and system design
c. Security policy, protection mechanisms and software
d. Security policy, protection mechanisms and system design
- The answer is A. The security kernel makes up the main component of the TCB, which is made up of software, hardware, and firmware. The security kernel performs a lot of different activities to protect the system, enforcing the reference monitor’s access rules is just one of those activities.
- The Orange Book states that the trusted computing base should uniquely identify each user for accountability purposes and __________.
a. Require the user to perform object reuse operations.
b. Associate this identity with all auditable actions taken by that individual.
c. Associate this identity with all processes the user initiates.
d. Require that only that user have access to his specific audit information.
- The answer is B. Proper security implementations include tracking individuals and their actions. The users need to be identified uniquely to be able to track their individual activities. If all users logged in and authenticated to a system as ‘user001’, the system could never be able to distinguish which user actually carried out specific actions.
- The trusted computing base (TCB) controls which of the following?
a. All trusted processes and software components
b. All trusted security policies and implementation mechanisms
c. All trusted software and design mechanisms
d. All trusted software and hardware components
- The answer is D. The TCB contains and controls all protection mechanisms within the system, whether they are software, hardware, or firmware.
- What is the imaginary boundary that separates components that maintain security from components that are not security related?
a. Reference monitor
b. Security kernel
c. Security perimeter
d. Security policy
- The answer is C. The security perimeter is a boundary between items that are within the TCB and the ones that are not part of the TCB. It is just a mark of delineation between these two groups of items.
- What is the best description of a security kernel from a security point of view?
a. Reference monitor
b. Resource manager
c. Memory mapper
d. Security perimeter – Leo thinks this is the best answer (if you wanted to know)
- The answer is A. The security kernel enforces the concept of the reference monitor and the rules outlined in the reference monitor construct. Although this chapter described the security kernel and reference monitor as two separate things, many times they are viewed as one component because they are so interrelated.
- In secure computing systems why is there a logical form of separation used between processes?
a. Processes are contained within their own security domains so that each does not make unauthorized accesses to other objects or their resources
b. Processes are contained within their own security perimeter so that they can only access protection levels above them
c. Processes are contained within their own security perimeter so that they can only access protection levels equal to them
d. The separation is hardware and not logical in nature
- The answer is A. Processes are assigned their own variables and memory segments, which makes up their domain. This is done so that they do not corrupt each other data or processing activities.
- What is the final step in authorizing a system for use in an environment?
a. Certification
b. Security evaluation and rating
c. Accreditation
d. Verification
- The answer is C. Certification is a technical review of a product and accreditation is management’s formal approval of the findings of the certification process.
- What feature enables code to be executed without the usual security checks?
a. Ring 0
b. Maintenance hook
c. Timing channel
d. Ready state
- The answer is B. Maintenance hooks get around the system or application’s security and access control checks by allowing who ever knows the key sequence to access the application and most likely its code. Maintenance hooks should be removed from any code before it gets into production.
- If a component fails, a security system should be designed to do which of the following?
a. Change to a protected execution domain
b. Change to a problem state
c. Change to a more secure state (AKA, Fail Safe/Secure)
d. Release all data held in volatile memory
- The answer is C. The state machine model dictates that a system should start up securely, conduct transitions securely, and even fail securely. This means that if the system encounters something it deems as unsafe, it should change to a more secure state for self-preservation and protection.
- What advantage does firmware have over software?
a. It is difficult to modify without physical access.
b. It requires a smaller memory segment.
c. It does not need to enforce the security policy.
d. It is easier to reprogram.
- The answer is A. Firmware is some type of software that is held in a ROM or EROM chip. It is usually used to allow the computer to be able to communicate with some type of peripheral device. The system’s BIOS instructions are also held in firmware on the motherboard. In most situations firmware cannot be modified unless someone has physical access to the system. This is different than other types of software that may be modified remotely.
- Which is the first level that requires classification labeling of data?
a. B3
b. B2
c. B1
d. C2
- The answer is C. These assurance ratings are from the Orange Book. B levels and on up require security labels to be used, but the question asks which is the first level to require this. B1 comes before B2 and B3, thus it is the correct answer.