Sybex Chp 9 Flashcards

1
Q

Allows for a “sandbox” mode to isolate the program from the rest of the OS and enforces strict rules about resources those objects can access.

Java Applets
Active X Controls

A

Java Applets

Active X Controls are not subject to sandbox rules, have full access to the Windows OS, and can perform a number of privileged actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Grid Computing?

A

Grid Computing is a form of parallel distributed processing that loosely groups a significant number of processing nodes to work toward a specific processing goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the concerns with Grid Computing?

A

1) The content of each work packet is potentially exposed to the world
2) Potential risk of a compromise at the central grid servers could trick grid members into performing malicious actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True / False

SXML is often used to provide web-based SSO

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the goals of MDM

A

Mobile Device Management goals include:

1) improve security
2) provide monitoring
3) enable remote management
4) support troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IoT?

A

Internet of Things

Collection of devices that can communicate over the Internet with one another or with a control console in order to affect and monitor the real world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a wrapper used in a Trojan Horse?

A

A wrapper is something used to enclose or contain something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False

So that layer integrity is maintained, inner layers neither know or depend on outer layers

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensures that data existing at one level of security is not visible to processes running at different security levels.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requires that the OS provide separate memory spaces for each process’s instructions and data.

A

Process Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False

Process Isolation protects the integrity of a process

A

True

Process Isolation prevents unauthorized data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False

It is generally better to use APIs to ask for supervisory mode services or to pass control to trusted, well-protected supervisory mode processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ is the application of the principal of least privilege to administrators.

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define covert channel

A

A method that is used to pass information over a path that is not normally used for communications.

Covert Timing Channel - conveys information by alerting the performance of a system component or modifying a resource’s timing in a predictable way.

Covert Storage Channel - conveys information by writing data to a common storage area where another process can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trusted Recovery

A

ensures that all system controls remain intact in the event of a crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Diddling

A

Making small (non-obvious) random or incremental changes to data during storage, processing, input, output, or transaction

Attack commonly performed by insiders

17
Q

TOCTOU is also called a __________

A

Time of Check, Time of Use id also called a:

Race Condition

18
Q

Simultaneous execution of multiple applications on a single processor

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multitasking

19
Q

More than one CPU harnesses the power of more than one processor to execute a single application

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multiprocessing

20
Q

Pseudo-simultaneous execution of two tasks on a single processor coordinated by the OS (usually done in batch)

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multiprogramming

21
Q

Permits multiple concurrents tasks to be performed within a single process (MS Word open with two documents)

Multithreading
Multitasking
Multiprocessing
Multiprogramming

A

Multithreading

22
Q

What is the most effective means for reducing risk of losing data on a mobile device, such as a notebook computer?

1) Defining a strong logon password
2) Minimizing sensitive data stored on the mobile device
3) Using a cable lock
4) Encrypting the hard drive

A

Minimizing sensitive data stored on the mobile device

think like a manager

23
Q

What type of electrical component serves as the primary building block for dynamic RAM?

1) Capacitor
2) Resistor
3) Flip-flop
4) Transistor

A

Capacitor

24
Q

What type of memory can be written to once?

ROM
PROM
EPROM
EEPROM

A

PROM

25
Q

What type of memory is a system BIOS usually written to?

ROM
PROM
EPROM
EEPROM

A

EEPROM

26
Q

What type of memory requires ultraviolet light to be shone through a window in order to be erased?

A

EPROM

27
Q

What type of memory is directly available to the CPU?

Real Memory
Cache Memory
Registry Memory
Virtual Memory

A

Registry Memory

28
Q

In what type of addressing scheme is the data actually supplied to the CPU as an argument to the instruction?

Direct addressing
Immediate addressing
Base+offset addressing
Indirect offsetting

A

Immediate addressing

29
Q

In what type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand?

Direct addressing
Immediate addressing
Base+offset addressing
Indirect offsetting

A

Indirect offsetting

30
Q

Which security principal mandates that only a minimum number of operating system processes should run in supervisory mode?

Abstraction
Layering
Data hiding
Least privledge

A

Least privledge

31
Q

Which security principal takes the concept of process isolation and implements it using physical controls?

Hardware segmentation
Data hiding
Layering
Abstraction

A

Hardware segmentation