MSIS Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

______ is a general access control method that uses capabilities in the form of tokens to pass right around.

Posix

If your computer starts having a bunch of weird problems but you can't seem to repeat any one issue regularly it might be your _________. You shouldn't have tried to be cheap on this part.

Power Supply

is volatile memory on your computer. Upgrading your computer by getting more of this is a good idea.

RAM

__________ access control, permissions are aggregated in roles that are assigned to users or groups

RBAC, role based

is memory that is built on the motherboard. It was originally not changeable but now you can "flash" it, like when upgrading the BIOS.

ROM

Can be applied to both copyrights and patents

Apache 2.0 License

______ is our belief that an operating system is implemented in a way that enforces our security policy.

Assurance

The first set of instructions that your computer uses is the ________

BIOS

Restricts use of contributor names for endorsement of a derived work

BSD License

______ register sets the lower memory location.

Base

is the brains of the computer. It's about the size of a saltine cracker (though really it is the size of a fingernail and all the rest of that space is used for other things)

CPU

Computer code that is turned into machine code all at once is said to be

Compiled

More for design work than code development

Creative Commons (CC) License

______ testing is ethical hacking, where a team is hired to try and break the network perimeter of a business.

Pen, Penetration

Optical media, like a CD or DVD, don't actually store bits on the disk but rather uses_______ in a slightly complicated way that can be translated to bits.

Pits and lands

With ___________ access control users can give and remove access to their objects at will.

Discretionary

file structure is older, uses large clusters and cannot hold a single file larger than 2GB.

FAT, FAT32

A hardware or software boundary in computer memory is called a ____________.

Fence

A ________ was essentially a big list matching users and rights with objects

File Directory

System memory space that could not be changed was usually enforced with a hardware _____ fence.

Fixe

________ uses mathematical models to test the security properties of a security model.

Formal verification

____________ in trusted software means that the software behaves as we expect.

Functional Correctness

Cannot use with paid and proprietary software

GNU GPL

are made of fast spinning platters and hold data magnetically.

Hard Drives

level languages like Python, Perl, Java, SQL are very human readable but require extra work to get them in shape for the CPU to understand. This can introduce vulnerabilties.

High

___________ in trusted software means that the integrity of the data is not damaged even if the software is given bad or unauthorized commands

Integrity Enforcement

Code that is turned into machine code one line at a time is

Interpreted

_____ is a simple acronym that supports the concept of economy of mechanism in trusted system design.

KISS

__________ uses capabilites called Tickets to grant permissions, like a carnival.

Kerberos

was an early 90s hacker collective and one of the first hackerspaces.

L0pht Heavy Industries

The older password hash that was heavily compromised by Microsoft was the ________ hash. It was compromised by uppercasing, truncation, splitting and static code use.

LM, LM Hash

Allows the concurrent use of paid of propriety software with its code.

Lesser GNU GPL (LGPL)

______ file structure is smaller, newer and more efficient. I used shot glasses as an analogy for these clusters.

NTFS

The current hash method for computers is the ________ hash, which is 32 bytes long.

NTLM

With _________, both memory and programs are broken into equal size pieces.

Pagin

Allow new or changed data values to be accepted by a program unchecked

incomplete mediation

The core set of things that a CPU can do is known as the

instruction set

scan uses ultraviolet light for eye authentication and is clone-proof.

iris

As a user authentication source, a thumbprint is something a user

is

the ________ is all the possible combinations for a password given any constraints

key space

As a user authentication source, a PIN number is something a user

knows

The rules about how you and others can use a particular piece of open-source software are included in the

license

The lowest possible programming language is ________ code

machine

The person responsible for looking after the integrity of an open source project's code is called the

maintainer

With ___________ access control a central authority decides who accesses what.

mandatory

is the first thing accessed on a drive and it points to the operating system

master boot record

In older mainframes the ________ was a program that actively kept the users' programs separate.

monitor

is the main part of a computer. It has the ports sticking out the back, manages data flow, and holds the CPU, RAM, video card and other important pieces.

motherboard

authentication is when you use a combination of authentication methods, like your ATM card and your PIN.

multifactor

Software code that adds or changes functionality is called a

patch

is a small amount of code added to a program to fix a known problem.

patch

Closely following someone into a restricted access area is called

piggybacking

ith variable memory fencing the ___________ is used to move all the memory location references by a constant amount in response to a moved fence.

relocation factor

scan uses the pattern of blood vessels in the eye and requires that the scan be done at close range.

retinal

Putting a random string in front of a password prior to hashing it is called ________ the password.

salting

Watching someone enter a code like at an ATM is called

shoulder surfing

The current code that makes up a program but still needs to be compiled or interpreted is called

source code

Altering the order of CPU instructions so as to execute a bad instruction

stack overflow

space is simply the space you haven't used on your hard drive.

unallocated

Incorporating a change or patch into original source code is called

upstreaming

Allowing user input to directly change commands sent to a database

SQL injection

Windows stores passwords on the computer in the

Security Accounts Manager

The ________ is the collection of code that checks access to protected objects in an operating system

Security Kernel

With program _________, the pieces are named and code is referenced by the name and an offset from the top of the code block. This was innovative because it separated physical memory from logical memory.

Segmentation

space is unused space remaining in clusters. Data can be hidden here and old data can be found here.

Slack

drives have no moving parts and make digital forensics more difficult.

Solid state, SSD

______________ is an old memory protection approach that gave permission to each word of memory

Tagged Architecture

The most common form of character encoding on the internet is

UTF8

_______ group protection includes groups for User, Group and World.

Unix

is the act of verifying a claimed identity, like using a PIN or password.

User Authentication

__________ is the act of making sure that software is built to specification. This includes implementation checks to ensure the software works once installed.

Validation

System memory space that can be changed - typically with software - used to be done with a _____ fence.

Variable

______ group protection includes groups for Admin, Power User, User and Guest.

Windows

__________ language is the lowest programming language that uses any kind of human-readable words.

assembly

Authentication methods that rely on the physical characteristics of a user are called

biometrics

A departure from the original open source code that may later be included is called a software

branch

Trying every single possible password combination is a

brute force

Commiting more data to memory than has been allotted

buffer overflow

In 1992 the US revised the book on creating levels of trust for opearting systems in varying environments. This revision is now commonly known as the ____________

common criteria

management ensures that muliple users can change data at the same time without conflicts arising from simultaneous transactions.

concurrency

is someone who has made new code or code changes that are accepted into the original source code.

contributor

Using a list of words to guess a password is called a

dictionary attack

Digging through the trash looking for passwords and other confidential information is called

dumpster diving

The popular open source motto regarding code changes is "Upstream ________"

early and often

is a mistake made - intentionally or purposefully - by humans that results in a problem with a computer program.

error

is when a computer program ceases working properly.

failure

a ________ is a problem in program code or design that can lead to a system breakdown but hasn't yet.

fault

active _______ means that a program should watch for errors so that it fails gracefully if needed.

fault detection

allows the program to continue working in the event of a failure of some of the parts

fault tolerance

A permanent split from an open source code development path is called a

fork

As a user authentication source, a password token phone app is something a user

has

The standard code page developed from telegraphic codes is

ASCII

______________ list relies on having each object carry its own list of rights per object or user

Access Control

Shortest and least restrictive license listed here

MIT License


Kaugnay na mga set ng pag-aaral

Mental Health Nursing Test 5- Ch 17

View Set

F7 Stockholder's Equity, EPS, Statement of Cashflows Becker 2016

View Set

Bronfenbrenner's Bio-Ecological Model of Development Theory

View Set

WOS 1. 1 Życie zbiorowe i jego reguły

View Set

Chapter 7 Drugs for Women's Health Prep U

View Set

Meteorology Test Chapters 4,5,6 & 7

View Set