Term
What does the acronym DSL stand for as it relates to security design? |
|
Definition
Defense in depth, Reducing single points of failure, reducing weakest links |
|
|
Term
________ sets a standard for addressing security throughout the development, deployment, and implementation schedule. |
|
Definition
|
|
Term
|
Definition
Enterprise Security Architecture |
|
|
Term
|
Definition
Information Security Architecture |
|
|
Term
|
Definition
A well-recognized and accepted approach |
|
|
Term
___________ is a high level perspective of how business requirements are to be structured. |
|
Definition
|
|
Term
____________ is a defined approach to the process used to achieve the goals of an architecture. |
|
Definition
|
|
Term
____________ refers to the integrated building blocks that support the goals of the architecture. |
|
Definition
|
|
Term
A security ___________ outlines how security is to be implemented within the organization. |
|
Definition
|
|
Term
What is the difference between strategic and tactical? |
|
Definition
Strategic is a long-range perspective and tactical is short range |
|
|
Term
What are the four computer architecture layers? |
|
Definition
Applications, Utilities, Operating Systems, and Hardware |
|
|
Term
A __________ is a large, fault tolerant, multiuser computer engineered to run without interruption for long periods of time. |
|
Definition
|
|
Term
____________ is a smaller system architected into a centralized model. |
|
Definition
|
|
Term
__________ are also kn own a desktops. |
|
Definition
|
|
Term
A __________ is the interface device that enables a computer to communicate over various media. |
|
Definition
|
|
Term
A ____________ connects a wired network to a wireless network. |
|
Definition
|
|
Term
A ____________ is a bridge that connects to nodes wirelessly. |
|
Definition
|
|
Term
A ______________ is a device that integrates a wireless access point with an IP Router and an Ethernet Switch. |
|
Definition
|
|
Term
A _____________ can increase the range of an existing wireless network. |
|
Definition
|
|
Term
_____________ is software that is permanently embedded in hardware and typically provides low-level services and/or control of hardware. |
|
Definition
|
|
Term
What are the two main components of a CPU? |
|
Definition
Control Unit and Arithmetic Logic Unit. |
|
|
Term
What does a CPU's control unit do? |
|
Definition
Handles instructions, handles I/O, and handles clock cycles |
|
|
Term
_____________ refers to the concurrent performance/interleaved execution of two or more tasks. |
|
Definition
|
|
Term
___________ refers to the interleaved execution of two or more programs by a processor. |
|
Definition
|
|
Term
______________ refers to the simultaneous execution of two or more programs by a computer. Generally refers to parallel processing by two or more processors of a multiprocessor. |
|
Definition
|
|
Term
___________ refers to two or more processors on a single chip. |
|
Definition
|
|
Term
______________ allows several processors to share the same resource. |
|
Definition
|
|
Term
____________ allows a hardware device to access system memory without having to go through a CPU. |
|
Definition
|
|
Term
_______________ are systems that support mission critical services such as flight controls. |
|
Definition
|
|
Term
What are the two types of Virtual Machine Architecture? |
|
Definition
|
|
Term
The ___________ state is used to execute a system's programs. In this state, a program can access the entire system and execute both privileged and non-privileged instructions. |
|
Definition
|
|
Term
The __________ state, sometimes called the user state or program state, is intended for programs which execute non-privileged instructions. |
|
Definition
|
|
Term
What state is the CPU in when it is executing instructions? |
|
Definition
|
|
Term
What state is the CPU in when it is idle because there is either no input or it is waiting for another process to run? |
|
Definition
|
|
Term
A ______ state is unable to until an external event occurs. |
|
Definition
|
|
Term
The ___________ is responsible for moving data in and out of memory. |
|
Definition
|
|
Term
The ___________ consists of several components - software, firmware, and hardware, and represents all the security functionality of the OS. |
|
Definition
|
|
Term
_________ are the interface between the equipment and the system or application that is using the equipment. |
|
Definition
|
|
Term
_____________ are used for system maintenance and operation. |
|
Definition
|
|
Term
Unless a product is explicitly used for security, it will first be devoted to _____________. |
|
Definition
|
|
Term
|
Definition
Standards-Based interfaces that support standard protocols |
|
|
Term
|
Definition
|
|
Term
__________ systems only allow a single level of processing. |
|
Definition
|
|
Term
____________ systems permit users to execute any instruction available. |
|
Definition
|
|
Term
_____________ systems allow processing at two levels is permitted through some form of user authentication and authorization. |
|
Definition
|
|
Term
___________ systems are single purpose computers designed to perform a dedicated function. |
|
Definition
|
|
Term
A _____________ architecture refers to a system where a central server or group of servers provides service to a user who accesses the server(s) over the network. |
|
Definition
|
|
Term
A _____________ architecture refers to an architecture permitting centralized control and enforcement of security policies. |
|
Definition
|
|
Term
A _____________ architecture refers to an architecture with no centralized command and control. |
|
Definition
|
|
Term
A _____________ architecture refers to an architecture which removes most client functions from the desktop and moves them to the server. |
|
Definition
|
|
Term
__________ are a group of servers working together. |
|
Definition
|
|
Term
____________ is a software based architecture structure that provides translation or communication services between applications that were never designed to work directly together. |
|
Definition
|
|
Term
___________ memory addressing refers to a memory location that is independent of the current assignment of data to memory. |
|
Definition
|
|
Term
___________ memory addressing refers to memory addresses expressed as a location relative to a known point. |
|
Definition
|
|
Term
___________ memory addressing refers to memory addresses expressed as an actual value or location. |
|
Definition
|
|
Term
As it relates to memory protection, what is the base value? |
|
Definition
the lower limit of memory addressing that can be used |
|
|
Term
As it relates to memory protection, what is the limit value? |
|
Definition
the upper limit of memory addressing that can be used |
|
|
Term
________ are very high speed storage structures built into the CPU chip set. |
|
Definition
|
|
Term
____________ is the memory directly accessible to the CPU and with the highest response speed. |
|
Definition
|
|
Term
____________- is the very fast memory directly on the CPU chip body. |
|
Definition
|
|
Term
___________ is the main memory of the system and is provided through chips inserted into slots on the motherboard. |
|
Definition
|
|
Term
__________ is a simple, cost-effective storage solution that utilizes drives attached to the network. |
|
Definition
|
|
Term
___________ is a complex, expensive solution to offer large capacity storage for servers over high-speed links. |
|
Definition
|
|
Term
______________ isolation is accomplished through time limits. |
|
Definition
|
|
Term
_____________ isolation refers to separating out sensitive areas from common access. |
|
Definition
|
|
Term
_____________ isolation protects against malicious activity by not permitting a process to execute outside of a strict set of boundaries. |
|
Definition
|
|
Term
|
Definition
Requiring processes that occur at different layers to communicate through interfaces |
|
|
Term
_____________ means if a process does not have an interface with a process at a different layer, it cannot communicate and will, therefore, not have access to data on a different layer. |
|
Definition
|
|
Term
The __________ includes the reference monitor, hardware, software, inter-process communications, and human factors that make up a security solution. |
|
Definition
|
|
Term
The Trusted Computer Base monitors what four functions? |
|
Definition
Process Activation, Execution Domain Switching, Memory Protection, I/O Operations |
|
|
Term
The _____________- enforces access relationships between all subjects and objects based on privilege and need to know |
|
Definition
|
|
Term
According to the Abstract Machine concept, what are the three things that a reference monitor must be? |
|
Definition
Tamperproof, Always envoked, and Verifiable |
|
|
Term
What three things are the security kernel designed to do? |
|
Definition
Check every access, enforce least privilege, Verify acceptable usage |
|
|
Term
As it relates to a reference monitor, what is a subject? |
|
Definition
|
|
Term
As it relates to a reference monitor, what is an object? |
|
Definition
|
|
Term
The ideal location for security is at the _____________ level. |
|
Definition
|
|
Term
|
Definition
Trusted Protection Module |
|
|
Term
___________ will ensure that the security of a system cannot be circumvented through just one vulnerability. |
|
Definition
|
|
Term
Which Fundamental Model is designed to prevent data leakage? |
|
Definition
|
|
Term
A ___________ model tracks the movement of information from one object to another so that movement of sensitive data will be identified |
|
Definition
|
|
Term
Which fundamental model is concerned with logical separation and role based access control? |
|
Definition
|
|
Term
____________ is an abstract mathematical model where state variables represent the system state. |
|
Definition
|
|
Term
__________ model is a hierarchical model defining access control privilege levels |
|
Definition
|
|
Term
What are fundamental models? |
|
Definition
|
|
Term
What does the Bell LaPadula model address? |
|
Definition
|
|
Term
What type of model is the Bell LaPadula Model? |
|
Definition
|
|
Term
What are the three fundamental modes of access? |
|
Definition
Read only, write only, or read and write |
|
|
Term
In the Bell LaPadula model, you may read ______ and write ________. |
|
Definition
|
|
Term
What does the Biba model address? |
|
Definition
|
|
Term
What fundamental model is the Biba model based on? |
|
Definition
|
|
Term
With the Biba model, you may read ______ and write ________ |
|
Definition
|
|
Term
What does the Clark-Wilson Model Address? |
|
Definition
All three integrity goals |
|
|
Term
What are the three integrity goals addressed by the Clark-Wilson model? |
|
Definition
Preventing unauthorized users from making changes, Preventing authorized users from making improper changes, and maintaining internal and external consistency |
|
|
Term
What does internal consistency mean? |
|
Definition
Transactions must fit internal rules of systems |
|
|
Term
What does external consistency mean? |
|
Definition
Transactions must fit reality |
|
|
Term
What are the three components of the Clark-Wilson Model? |
|
Definition
All three integrity goals, Defines Well Formed transactions, and Separation of Duties |
|
|
Term
Which model uses the Chinese Wall security Policy? |
|
Definition
|
|
Term
What does the Brewer and Nash model allow? |
|
Definition
Separation of competitors' data within the same integrated database |
|
|
Term
What is the Brewer and Nash model designed to prevent? |
|
Definition
|
|
Term
What mediates access from subjects to objects? |
|
Definition
|
|
Term
Who coined the term monitor? |
|
Definition
|
|
Term
Who coined the term reference model? |
|
Definition
|
|
Term
Who formalized Access control Methods? |
|
Definition
Harrison-Ruzzo-Ullman(HRU) Result |
|
|
Term
What does TCSec (Orange Book) test for? |
|
Definition
|
|
Term
What is the International Equivalent of of TCSec? |
|
Definition
|
|
Term
What does ISO 15408 refer to? |
|
Definition
|
|
Term
What does ISO 27001 refer to? |
|
Definition
|
|
Term
What does ISO 27002 refer to? |
|
Definition
|
|
Term
A ____________ is a general set of security requirements and objectives for a category of products in Common Criteria. |
|
Definition
|
|
Term
____________ is a set of software, firmware, and/or hardware to be evaluated in Common Criteria |
|
Definition
|
|
Term
__________ contains the IT security objectives for a specific TOE in Common Criteria |
|
Definition
|
|
Term
What level of ITSec introduces discretionary access control and Identification/Authentication? |
|
Definition
|
|
Term
What level of ITSec introduces object reuse protection and Protected Audit trails? |
|
Definition
|
|
Term
What level of ITSec introduces mandatory access control and Labeled Protection? |
|
Definition
|
|
Term
What level of ITSec introduces Trusted Path and Covert Storage Channel Analysis? |
|
Definition
|
|
Term
What level of ITSec introduces Trusted Recovery and Covert Timing Channel Analysis? |
|
Definition
|
|
Term
What level of ITSec introduces formal design verification? |
|
Definition
|
|
Term
What did ISO 7498-2 define? |
|
Definition
|
|
Term
The ___________ framework is the de facto world standard for expressing the basic elements of an enterprise architecture. |
|
Definition
|
|
Term
What is the Zachman framework used for? |
|
Definition
To gather input for design requirements |
|
|
Term
What framework was the follow on the Zachman framework which had an operational security focus? |
|
Definition
|
|
Term
The ___________ framework is a framework to provide a comprehensive approach to design, planning, implementation, and governance of an enterprise information architecture |
|
Definition
The Open Group Architecture Framework (TOGAF) |
|
|
Term
_____________ describes a unified approach for evaluation of internal control systems |
|
Definition
Committee of Sponsoring Organizations (COSO) |
|
|
Term
What does ISO 27001 cover? |
|
Definition
Information Security Management Systems |
|
|
Term
What is the CMM based on? |
|
Definition
Total Quality Management concepts |
|
|
Term
What does the CMM provide a framework for? |
|
Definition
|
|
Term
_____________ sets the standard for the handling of credit card information. |
|
Definition
|
|
Term
What are the following frameworks designed to help an organization do: Zachman, SASBA, TOGAF |
|
Definition
|
|
Term
What are the following frameworks designed to help an organization do: CMMI ITIL Six Sigma |
|
Definition
|
|
Term
What are the following frameworks designed to help an organization do: ISO 27001, ISO 27002, SASBA, ITIL, PCI-DSS |
|
Definition
|
|
Term
What are the following frameworks designed to help an organization do: COSO, ISO 27001, CoBIT |
|
Definition
|
|
Term
What type of CPU functionality allows simultaneous execution of two or more programs by one or more processors? |
|
Definition
|
|
Term
What computer component organizes memory, logging, and error detection? |
|
Definition
|
|
Term
What CPU operational mode processes data for an application and allows less access to some resources? |
|
Definition
|
|
Term
What type of system architecture supports standardized interfaces and protocols, rather than proprietary and customized applications? |
|
Definition
|
|
Term
What network architectural structure is more secure, removes client functions, and primarily supports processing and storage at a centralized location? |
|
Definition
|
|
Term
What type of software is best described as being distributed, providing translation or communications, and expanding applications and services? |
|
Definition
|
|
Term
The ___________ is the combination of all hardware, software, and firmware responsible for enforcing the security policy and serves as a protection mechanism within a computer system. |
|
Definition
|
|
Term
Which security model addresses preventing unauthorized users from making modifications, preventing authorized users from making improper modifications, and maintaining internal and external consistency? |
|
Definition
|
|
Term
What Lattice Model is characterized by read down and no write down? |
|
Definition
|
|
Term
Which security model primarily protects confidentiality? |
|
Definition
|
|
Term
What fundamental security model is based on rules to prevent subjects that are operating in different domains from affecting each other? |
|
Definition
|
|
Term
What type of memory storage is the fastest, highest cost and lowest capacity? |
|
Definition
|
|
Term
What cloud computing service offers support to business operations without the organization building their own servers and networks? |
|
Definition
Infrastructure as a Service |
|
|
Term
A framework that provides a comprehensive approach to the design, planning, implementation, and governance of an enterprise and typically modeled at four levels - business, application, data, and technology |
|
Definition
|
|
Term
An international information security standard and framework that addresses security throughout all phases is called what? |
|
Definition
Information Security Management System |
|
|
Term
Which of the Common Criteria components outlines a general and industry set of security requirements for a category of products? |
|
Definition
|
|
Term
What Ring provides access to the system components and contains utilities and file system drivers? |
|
Definition
|
|
Term
To create a virtual memory on a computer, two different types of memory must be combined. What are they? |
|
Definition
RAM and secondary storage |
|
|
Term
What type of memory addressing uses absolute addresses? |
|
Definition
|
|
Term
What are the four Reference Monitor Design Rules? |
|
Definition
Mediate all access, tampering protection, verifiable, always on |
|
|