Security Engineering Flashcards

1
Q

Takes place when too much data is accepted as input to a specific process.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A countermeasure for buffer overflow.

A

Bounds Checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term for when an app does not release the memory it is using so that it is available to other apps.

A

Memory Leak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two counter measures for memory leak.

A

Garbage Collectors

Better code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When trying to access memory, CPU uses ____________ addresses. Applications use ______ addresses.

A

Physical

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ___________ acts like NAT for physical and logical memory addresses thereby providing security and efficiency.

A

Memory Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ASLR?

A

Address Space Layout Randomization. Introduced in Windows Vista (originally on OpenBSD).
Helps protect stuff in memory by making it harder to figure out where to attack it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DEP?

A

Data Execution Prevention. Marks certain memory locations as “off-limits.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are four methods of process isolation?

A

Encapsulation of objects (provides data hiding, talk to the API !!)
Time multiplexing of shared resources (OS coordinates different requests from different processes)
Naming distinctions (PIDs)
Virtual memory mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A virtual machine is commonly referred to as a _______ that is executed in the ________ environment. The VMs communicate with a __________ within the host environment, which is responsible for managing system resources.

A

Guest
Host
Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a maintenance hook?

A

A backdoor used by developers. Should be removed b4 release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of attack takes advantage of the dependency on the timing of events that take place in a multitasking operating system. The attacker jumps in between two tasks and modifies something to control results.

A

Time-of-Check/Time-of-Use (TOC/TOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of attack makes processes execute out of sequence to control results.

A

Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a countermeasure for race condition attacks?

A

Atomicise processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a countermeasure for Time-of-Check/Time-of-Use attacks?

A

Software locks on files.

Harder to put software locks on database components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The CPU uses this to keep track of where it is in the memory stack

A. Program Counter
B. Stack Pointer
C. Return Pointer
D. Stack Counter

A

B

17
Q

This register contains the memory address of the next instruction to be fetched.

A. Program Counter
B. Stack Pointer
C. Return Pointer
D. Stack Counter

A

A