click below
click below
Normal Size Small Size show me how
CISSP
CISSP Flash Cards
| Question | Answer |
|---|---|
| No Read Up/No Write Down | Bell LaPadula |
| No Read Down/No Write Up | Biba |
| Well Formed Transactions (Access Control Triple - User, Transformation Procedure, Constrained Data Item) | Clark-Wilson |
| Chinese Wall: Avoid Conflicts of Interest | Brewer-Nash |
| Table of access control permissions that exist between subjects and objects. The columns of the table show the ACL for each object or application. | Access Control Matrix |
| Separates hardware and software functionality into modular tiers. | Layering |
| Layer 3 (Ring Model) | Users |
| Layer 2 (Ring Model) | Device Drivers |
| Layer 1 (Ring Model) | Operating System |
| Layer 0 (Ring Model) | Kernel |
| Hides unnecessary details from the user | Abstraction |
| The list of objects a subject is allowed to access (e.g. Top Secret, Secret, Confidential, etc.) | Security Domain |
| Uses open hardware and standards from a variety of vendors | Open System Architecture |
| Uses proprietary hardware and software | Closed System Architecture |
| Makes source code publicly available | Open Source |
| A CPU is rated by the number of ___________ ___________ per second | Clock Cycles |
| The ALU (arithmetic logic unit) performs ______________ ____________. | Mathematical Calculations |
| Fetch and Executes Steps are: | 1.) Fetch 2.) Decode 3.) Execute 4.) Write |
| Combining multiple CPU (FDX and write) steps into one process | Pipelining |
| An executable program and its associated data loaded and running in memory | A Process |
| Another name for a (HWP) heavyweight process | A Task |
| A (LWP) lightweight process (spawned from a parent process) | A Thread |
| Allows multiple tasks (HWP) to run simultaneously on one CPU | Multitasking |
| Runs multiple processes on multiple CPUs | Multiprocessing |
| A logical control that attempts to prevent one from interfering with another | Process Isolation |
| Contains code in firmware that execute when a system is powered on | (BIOS) Basic Input/Output System |
| A chip/processor that can provide additional security capabilities at the hardware level | (TPM) Trusted Platform Module |
| Provides the interface between the hardware and the rest of the operating system, including applications | Kernel |
| Mediates all access between subjects and objects and enforces the system's security policy | Reference Monitor |
| Allows multiple "guest" operating systems to run on one physical "host" computer | Virtualization |
| Controls access between virtual guests and host hardware | Hypervisor |
| Cloud solution providing entire virtualized operating system that the customer configures from the OS up | IaaS - Infrastructure as a Service |
| Cloud solution providing a pre-configured operating system in which the customer configures the applications | PaaS - Platform as a Service |
| Cloud solution providing a completely configured system from the operating system to the applications | SaaS - Software as a Service |