5.1 Flashcards

1
Q

The person using the computer/device.

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Executable code designed to carry out specific tasks on the computer, also referred to as programs or software.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allow the user to interface with applications, system software, and hardware.

A

OS Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The heart of the OS. Manages the interaction between each layer.

A

OS Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The OS Kernel and OS Interface make up the _________.

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The mechanical, magnetic, electronic, and electrical components of a computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What three functions must every OS perform?

A
  1. ) File System Management
  2. ) Process Management
  3. ) Device Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defines the way data is named, stored, organized, and accessed on a hard drive.

A

File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Containers used to organize files and data for the benefit of usability and retrieval of data.

A

Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A singular named resource that is used for storing information/data.

A

File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An executing instance of an application.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any hardware component or peripheral attached to the computer.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The communications path between the OS and a device is made possible by ______..

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the five OS categories?

A
  1. ) Single User
  2. ) Multiuser
  3. ) Client
  4. ) Server
  5. ) Distributed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Only one user can perform a task at any time.

A

Single User, Single-Tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Only one user can perform multiple tasks (programs) at a time.

A

Single User, Multi-Tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One or more users can perform one or more tasks each at one time.

A

Multiuser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Composed of more than one computer or device in which all communicate with one another using a common language or protocol.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what is known as __________.

A

Information Assurance (IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IA measures are taken to assure what?

A
  1. ) Confidentiality
  2. ) Integrity
  3. ) Availability
  4. ) Non-repudiation
  5. ) Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Assurance that no unauthorized modification or destruction of information occurred.
Integrity
26
Assurance of reliable access to data and services for authorized users.
Availability
27
Assurance that data delivery is proven to be from a reliable source.
Non-repudiation
28
Assurance of properly verifying a user's credentials. The process of the user proving who they claim to be, by providing the credentials for a valid account on the system. May be provided in what forms?
Authentication; 1. ) Username and/or Password 2. ) Card or Token 3. ) Biometrics
29
User accounts with full system access. What are the names in Linux and Windows?
Privileged User Account; Called Root in Linux and Administrator in Windows
30
User accounts with limited access.
Non-Privileged User Account
31
Three common methods of access control are _________, ________, and __________.
1. ) Discretionary Access Control (DAC) 2. ) Mandatory Access Control (MAC) 3. ) Role-Based Access Control (RBAC)
32
Commonly referred to as permissions and is implemented using Access Control Lists (ACLs).
Discretionary Access Control (DAC)
33
OSs enforce the system's security policy using security labels (e.g., need-to-know).
Mandatory Access Control (MAC)
34
Access decisions are based on each account's role or functional position. Used for processes, not files.
Role-Based Access Control (RBAC)
35
A record of system or user activities.
Log file
36
Term for when computer data is copied or archived, usually to a separate location, and for the purposed of data recovery should data loss occur.
Backup
37
What are three main types of Windows accounts?
1. ) Built-In 2. ) Local 3. ) Domain
38
Accounts automatically created when the OS is installed.
Built-In
39
User account with the highest level of privileges and permissions on Windows.
Administrator Account
40
Account intended for temporary access when an individual user account does not exist.
Guest Account
41
Account authenticated by the local machine.
Local Account
42
Account authenticated by a domain controller.
Domain Account
43
A centralized server in a Windows network that stores domain account credentials in a data base called Active Directory.
Domain Controller
44
Each Windows system is considered to be "standalone" with regards to authentication.
Workgroup
45
A collection of computers sharing common configurations, resources, and security principles that are maintained by a centralized database known as Active Directory.
Domain
46
Accounts that may contain user accounts, computer accounts, and even other group accounts. Used to logically organize users, with the ultimate goal of assigning permissions to system resources such as files and directories.
Local Group Accounts
47
A structure where all directories and files fall under a disk volume's root directory.
Hierarchical directory structure
48
Windows identifies the root directory with a _____ character.
Backslash (\)
49
The _______ folder contains a sub directory for each user who has logged on to the system.
Documents and Settings
50
Contains folders and files of installed software, like Microsoft Office, Adobe Acrobat, Symantec Antivirus, or other optional 3rd party software.
Program Files
51
Which folder contains all OS files?
System root folder
52
Contains most of the built-in Windows system files, programs, and commands.
C:\WINDOWS\system32 directory
53
Used to make files and/or folders with the hidden attribute, viewable
Show hidden files and folders
54
When checked, hides known file extensions. | When unchecked, displays known file extensions.
Hide extensions for known file types
55
When unchecked, files and/or folders with the system attribute will be visible.
Hide protected operating system files.
56
These options may be used to configure all present and future Windows Explorer sessions with the same viewing options.
Apply to All Folders and Reset All Folders
57
Defined as any characteristic of a file or directory; on/off type features
Attribute
58
May have varying values, e.g., name, size, time, dates, etc.
Properties
59
Examples of file/directory attributes are:
Archive, Read-Only, Compression, Hidden, Encryption, System (ARCHES)
60
The mechanism by which a system determines the level of access an authenticated user has to system resources (e.g., files and directories).
Authorization
61
What are six basic NTFS permissions?
Read, Write, Read & Execute, List Folder Contents, Modify, Full Control
62
(Folders) Permits viewing and listing of files and subfolders. (Files) Permits viewing file contents
Read Permission
63
(Folders) Permits adding of files and subfolders. (Files) Permits writing to a file.
Write Permission
64
(Folders) Permits viewing and listing of files and subfolders as well as file execution; inherited by files and folders. (Files) Permits viewing file contents and file execution.
Read & Execute Permission
65
(Folders) Permits viewing a list of files and subfolders; inherited by folders only. (Files) N/A
List Folder Contents Permission
66
(Folders) Permits reading and writing of files and subfolders; allows deletion of folder. (Files) Permits reading and writing of the file; allows deletion of the file.
Modify Permission
67
(Folders) Permits reading, writing, changing of permissions, and deleting of files and subfolders. (Files) Permits reading, writing, changing of permissions, and deleting of the file.
Full Control Permission
68
What special group gave Full Control Permissions by default on Windows 2000 and prior OSs?
Everyone Group
69
Giving other systems access to a directory over the network.
Shares
70
Local database where local account credentials are maintained.
Security Accounts Manager (SAM)
71
A database on a Windows network that stores domain account credentials.
Active Directory