Security Architecture and Models Flashcards
QUESTION NO: 98 What is it called when a computer uses more than one CPU in parallel to execute instructions? A. Multiprocessing B. Multitasking C. Multithreading D. Parallel running
Answer: A
QUESTION NO: 99 What is the main purpose of undertaking a parallel run of a new system? A. Resolve any errors in the program and file interfaces B. Verify that the system provides required business functionality C. Validate the operation of the new system against its predecessor D. Provide a backup of the old system
Answer: B
QUESTION NO: 100 Which of the following provide network redundancy in a local network environment? A. Mirroring B. Shadowing C. Dual backbones D. Duplexing
Answer: C
QUESTION NO: 101 A server farm is an example of: A. Server clustering B. Redundant servers C. Multiple servers D. Server fault tolerance
Answer: A
QUESTION NO: 102 In which state must a computer system operate to process input/output instructions? A. User mode B. Stateful inspection C. Interprocess communication D. Supervisor mode
Answer: D Explanation: A computer is in a supervisory state when it is executing these privileged instructions. (privileged instructions are executed by the system administrator or by an individual who is authorized to use those instructions.)
QUESTION NO: 103 What should be the size of a Trusted Computer Base? A. Small – in order to permit it to be implemented in all critical system components without using excessive resources. B. Small – in order to facilitate the detailed analysis necessary to prove that it meets design requirements. C. Large – in order to accommodate the implementation of future updates without incurring the time and expense of recertification. D. Large – in order to enable it to protect the potentially large number of resources in a typical commercial system environment.
Answer: B Explanation: “It must be small enough to be able to be tested and verified in a complete and comprehensive manner.”
QUESTION NO: 104 Which one of the following are examples of security and controls that would be found in a “trusted” application system? A. Data validation and reliability B. Correction routines and reliability C. File integrity routines and audit trail D. Reconciliation routines and data labels
Answer: C Explanation: I have no specific reference for this question but the major resources hammer that there needs to be methods to check the data for correctness.
QUESTION NO: 105 Which of the following is an operating system security architecture that provides flexible support for security policies? A. OSKit B. LOMAC C. SE Linux D. Flask
Answer: D Explanation: Flask is an operating system security architecture that provides flexible support for security policies. The architecture was prototyped in the Fluke research operating system. Several of the Flask interfaces and components were then ported from the Fluke prototype to the OSKit. The Flask architecture is now being implemented in the Linux operating system (Security-Enhanced Linux) to transfer the technology to a larger developer and user community.
QUESTION NO: 106 Which of the following statements pertaining to the security kernel is incorrect? A. It is made up of mechanisms that fall under the TCB and implements and enforces the reference monitor concept. B. It must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof C. It must be small enough to be able to be tested and verified in a complete and comprehensive manner D. Is an access control concept, not an actual physical component
Answer: D
QUESTION NO: 107 What is a PRIMARY reason for designing the security kernel to be as small as possible? A. The operating system cannot be easily penetrated by users. B. Changes to the kernel are not required as frequently. C. Due to its compactness, the kernel is easier to formally verify. D. System performance and execution are enhanced.
Answer: C Explanation: I disagree with the original answer which was B (changes to the kernel) and think it is C (Due to its compactness). However, use your best judgment based on knowledge and experience. Below is why I think it is C. “There are three main requirements of the security kernel:It must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof. The reference monitor must be invoked for every access attempt and must be impossible to circumvent. Thus the reference monitor must be implemented in a complete and foolproof way. It must be small enough to be able to be tested and verified in a complete and comprehensive manner.”
QUESTION NO: 108 Which of the following implements the authorized access relationship between subjects and objects of a system? A. Security model B. Reference kernel C. Security kernel D. Information flow model
Answer: C
QUESTION NO: 109 The concept that all accesses must be meditated, protected from modification, and verifiable as correct is the concept of A. Secure model B. Security locking C. Security kernel D. Secure state
Answer: C Explanation: A security kernel is defined as the hardware, firmware, and software elements of a trusted computing base that implements the reference monitor concept. A reference monitor is a system component that enforces access controls on an object. Therefore, the reference monitor concept is an abstract machine that mediates all access of subjects to objects. The Security Kernel must: Mediate all accesses Be protected from modification Be verified as correct.
QUESTION NO: 110 What is an error called that causes a system to be vulnerable because of the environment in which it is installed? A. Configuration error B. Environmental error C. Access validation error D. Exceptional condition handling error
Answer: B
QUESTION NO: 111 Which of the following ensures that security is not breached when a system crash or other system failure occurs? A. trusted recovery B. hot swappable C. redundancy D. secure boot
Answer: A Explanation: “Trusted Recovery When an operating system or application crashes or freezes, it should not put the sytem in any time of secure state.”
QUESTION NO: 112 What type of subsystem is an application program that operates outside the operating system and carries out functions for a group of users, maintains some common data for all users in the group, and protects the data from improper access by users in the group? A. Prevented subsystem B. Protected subsystem C. File subsystem D. Directory subsystem
Answer: B
QUESTION NO: 113 A ‘Pseudo flaw’ is which of the following? A. An apparent loophole deliberately implanted in an operating system B. An omission when generating Pseudo-code C. Used for testing for bounds violations in application programming D. A Normally generated page fault causing the system halt
Answer: A
QUESTION NO: 114 Which of the following yellow-book defined types of system recovery happens after a system fails in an uncrontrolled manner in response to a TCB or media failure and the system cannot be brought to a consistent state? A. Recovery restart B. System reboot C. Emergency system restart D. System Cold start
Answer: C Reference: “Emergency system restart is done after a system fails in an uncontrolled manner in response to a TCB or media failure. In such cases, TCB and user objects on nonvolatile storage belonging to processes active at the time of TCB or media failure may be left in an inconsistent state. The system enters maintenance mode, recovery is performed automatically, and the system restarts with no user processes in progress after bringing up the system in a consistent state.”
QUESTION NO: 115 Which one of the following describes a reference monitor? A. Access control concept that refers to an abstract machine that mediates all accesses to objects by subjects. B. Audit concept that refers to monitoring and recording of all accesses to objects by subjects. C. Identification concept that refers to the comparison of material supplied by a user with its reference profile. D. Network control concept that distributes the authorization of subject accesses to objects.
Answer: A Explanation: A reference monitor is a system component that enforces access controls on an object. Therefore, the reference monitor concept is an abstract machine that mediates all access of subjects to objects
QUESTION NO: 116 What can best be described as an abstract machine which must mediate all access to subjects to objects? A. A security domain B. The reference monitor C. The security kernel D. The security perimeter
Answer: B
QUESTION NO: 117 What is the PRIMARY component of a Trusted Computer Base? A. The computer hardware B. The security subsystem C. The operating system software D. The reference monitor
Answer: D Explanation: “The security kernel is made up of hardware, software, and firmware components that fall within the TCB and implements and enforces the reference monitor concept. The security kernel mediates all access and functions between subjects and objects. The security kernel is the core of the TCB and is the most commonly used approach to building trusted computing systems. There are three main requirements of the security kernel: • It must provide isolation for the processes carrying out the reference monitor concept, and the processes must be tamperproof. • It must be invoked for every access attempt and must be impossible to circumvent. Thus, the security kernel must be implemented in a complete and foolproof way. • It must be small enough to be able to be tested and verified in a complete and comprehensive manner. These are the requirements of the reference monitor; therefore, they are the requirements of the components that provide and enforce the reference monitor concept—the security kernel.”
QUESTION NO: 118 Which of the following is best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in the system? A. Fail proof B. Fail soft C. Fail safe D. Fail resilient
Answer: C
QUESTION NO: 119 LOMAC uses what Access Control method to protect the integrity of processes and data? A. Linux based EFS. B. Low Water-Mark Mandatory Access Control. C. Linux based NFS. D. High Water-Mark Mandatory Access Control.
Answer: B Explanation: LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use.
QUESTION NO: 120 On Linux, LOMAC is implemented as: A. Virtual addresses B. Registers C. Kernel built in functions D. Loadable kernel module
Answer: D Explanation: LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use. “Security Kernel - The hardware, firmware, and software elements of a trusted computing base (TCB) that implements the reference monitor concept. It must mediate all accesses between subjects and objects, be protected from modification, and be verifiable as correct.”
QUESTION NO: 121 LOMAC is a security enhancement for what operating system? A. Linux B. Netware C. Solaris
Answer: A Explanation: LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use.