1.6 Security and Protection Flashcards

1
Q

If a computer system has multiple users, access to data must be regulated by __________.

A

mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Memory-addressing hardware ensures that a process can execute only within its own __________.

A

address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The __________ ensures that no process can gain control of the CPU without eventually relinquishing control.

A

timer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Device-control registers are not accessible to __________.

A

users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protection is any mechanism for controlling the access of processes or users to the __________ defined by a computer system.

A

resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection mechanisms must provide means to specify the controls to be imposed and to __________ the controls.

A

enforce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protection can improve reliability by detecting latent errors at the __________ between component subsystems.

A

interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An unprotected resource cannot defend against use or misuse by an __________ or incompetent user.

A

unauthorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protection-oriented system provides a means to distinguish between authorized and __________ usage.

A

unauthorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security is responsible for defending a system from external and internal __________.

A

attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial-of-service attacks use all of a system’s resources and keep legitimate users __________.

A

out of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating system security features are a fast-growing area of __________ and implementation.

A

research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most operating systems maintain a list of user names and associated __________.

A

user identifiers (user IDs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Windows, the user identifier is known as a security __________.

A

ID (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a user logs in to the system, the authentication stage determines the appropriate __________ for the user.

A

user ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To distinguish among sets of users, we need to define a __________ name and the set of users belonging to that group.

17
Q

Group functionality can be implemented as a system-wide list of __________ names and group identifiers.

18
Q

A user can be in one or more __________, depending on operating-system design decisions.

19
Q

A user sometimes needs to escalate __________ to gain extra permissions for an activity.

A

privileges

20
Q

On UNIX, the setuid attribute on a program causes that program to run with the user ID of the __________ of the file.

21
Q

The process runs with this effective UID until it turns off the extra privileges or __________.

A

terminates