5.1 Flashcards

1
Q

The person using the computer/device.

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Executable code designed to carry out specific tasks on the computer, also referred to as programs or software.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allow the user to interface with applications, system software, and hardware.

A

OS Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The heart of the OS. Manages the interaction between each layer.

A

OS Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The OS Kernel and OS Interface make up the _________.

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The mechanical, magnetic, electronic, and electrical components of a computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What three functions must every OS perform?

A
  1. ) File System Management
  2. ) Process Management
  3. ) Device Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defines the way data is named, stored, organized, and accessed on a hard drive.

A

File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Containers used to organize files and data for the benefit of usability and retrieval of data.

A

Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A singular named resource that is used for storing information/data.

A

File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An executing instance of an application.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any hardware component or peripheral attached to the computer.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The communications path between the OS and a device is made possible by ______..

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the five OS categories?

A
  1. ) Single User
  2. ) Multiuser
  3. ) Client
  4. ) Server
  5. ) Distributed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Only one user can perform a task at any time.

A

Single User, Single-Tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Only one user can perform multiple tasks (programs) at a time.

A

Single User, Multi-Tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One or more users can perform one or more tasks each at one time.

A

Multiuser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Composed of more than one computer or device in which all communicate with one another using a common language or protocol.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what is known as __________.

A

Information Assurance (IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IA measures are taken to assure what?

A
  1. ) Confidentiality
  2. ) Integrity
  3. ) Availability
  4. ) Non-repudiation
  5. ) Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Assurance that no unauthorized modification or destruction of information occurred.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Assurance of reliable access to data and services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Assurance that data delivery is proven to be from a reliable source.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Assurance of properly verifying a user’s credentials. The process of the user proving who they claim to be, by providing the credentials for a valid account on the system. May be provided in what forms?

A

Authentication;

  1. ) Username and/or Password
  2. ) Card or Token
  3. ) Biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

User accounts with full system access. What are the names in Linux and Windows?

A

Privileged User Account; Called Root in Linux and Administrator in Windows

30
Q

User accounts with limited access.

A

Non-Privileged User Account

31
Q

Three common methods of access control are _________, ________, and __________.

A
  1. ) Discretionary Access Control (DAC)
  2. ) Mandatory Access Control (MAC)
  3. ) Role-Based Access Control (RBAC)
32
Q

Commonly referred to as permissions and is implemented using Access Control Lists (ACLs).

A

Discretionary Access Control (DAC)

33
Q

OSs enforce the system’s security policy using security labels (e.g., need-to-know).

A

Mandatory Access Control (MAC)

34
Q

Access decisions are based on each account’s role or functional position. Used for processes, not files.

A

Role-Based Access Control (RBAC)

35
Q

A record of system or user activities.

A

Log file

36
Q

Term for when computer data is copied or archived, usually to a separate location, and for the purposed of data recovery should data loss occur.

A

Backup

37
Q

What are three main types of Windows accounts?

A
  1. ) Built-In
  2. ) Local
  3. ) Domain
38
Q

Accounts automatically created when the OS is installed.

A

Built-In

39
Q

User account with the highest level of privileges and permissions on Windows.

A

Administrator Account

40
Q

Account intended for temporary access when an individual user account does not exist.

A

Guest Account

41
Q

Account authenticated by the local machine.

A

Local Account

42
Q

Account authenticated by a domain controller.

A

Domain Account

43
Q

A centralized server in a Windows network that stores domain account credentials in a data base called Active Directory.

A

Domain Controller

44
Q

Each Windows system is considered to be “standalone” with regards to authentication.

A

Workgroup

45
Q

A collection of computers sharing common configurations, resources, and security principles that are maintained by a centralized database known as Active Directory.

A

Domain

46
Q

Accounts that may contain user accounts, computer accounts, and even other group accounts. Used to logically organize users, with the ultimate goal of assigning permissions to system resources such as files and directories.

A

Local Group Accounts

47
Q

A structure where all directories and files fall under a disk volume’s root directory.

A

Hierarchical directory structure

48
Q

Windows identifies the root directory with a _____ character.

A

Backslash ()

49
Q

The _______ folder contains a sub directory for each user who has logged on to the system.

A

Documents and Settings

50
Q

Contains folders and files of installed software, like Microsoft Office, Adobe Acrobat, Symantec Antivirus, or other optional 3rd party software.

A

Program Files

51
Q

Which folder contains all OS files?

A

System root folder

52
Q

Contains most of the built-in Windows system files, programs, and commands.

A

C:\WINDOWS\system32 directory

53
Q

Used to make files and/or folders with the hidden attribute, viewable

A

Show hidden files and folders

54
Q

When checked, hides known file extensions.

When unchecked, displays known file extensions.

A

Hide extensions for known file types

55
Q

When unchecked, files and/or folders with the system attribute will be visible.

A

Hide protected operating system files.

56
Q

These options may be used to configure all present and future Windows Explorer sessions with the same viewing options.

A

Apply to All Folders and Reset All Folders

57
Q

Defined as any characteristic of a file or directory; on/off type features

A

Attribute

58
Q

May have varying values, e.g., name, size, time, dates, etc.

A

Properties

59
Q

Examples of file/directory attributes are:

A

Archive, Read-Only, Compression, Hidden, Encryption, System (ARCHES)

60
Q

The mechanism by which a system determines the level of access an authenticated user has to system resources (e.g., files and directories).

A

Authorization

61
Q

What are six basic NTFS permissions?

A

Read, Write, Read & Execute, List Folder Contents, Modify, Full Control

62
Q

(Folders) Permits viewing and listing of files and subfolders. (Files) Permits viewing file contents

A

Read Permission

63
Q

(Folders) Permits adding of files and subfolders. (Files) Permits writing to a file.

A

Write Permission

64
Q

(Folders) Permits viewing and listing of files and subfolders as well as file execution; inherited by files and folders. (Files) Permits viewing file contents and file execution.

A

Read & Execute Permission

65
Q

(Folders) Permits viewing a list of files and subfolders; inherited by folders only. (Files) N/A

A

List Folder Contents Permission

66
Q

(Folders) Permits reading and writing of files and subfolders; allows deletion of folder. (Files) Permits reading and writing of the file; allows deletion of the file.

A

Modify Permission

67
Q

(Folders) Permits reading, writing, changing of permissions, and deleting of files and subfolders. (Files) Permits reading, writing, changing of permissions, and deleting of the file.

A

Full Control Permission

68
Q

What special group gave Full Control Permissions by default on Windows 2000 and prior OSs?

A

Everyone Group

69
Q

Giving other systems access to a directory over the network.

A

Shares

70
Q

Local database where local account credentials are maintained.

A

Security Accounts Manager (SAM)

71
Q

A database on a Windows network that stores domain account credentials.

A

Active Directory