Day 1 Flashcards
The Windows _____ attribute generally protects system files from common user access.
System
A mobile device uses a(n) ______ computer architecture.
RISC
The NTFS _____ permission is applied to files and permits the viewing or accessing of file contents.
Read
The principle of least privilege, where non-privileged user accounts are only granted access to what is authorized is implemented through _____.
Availability
_____ is a category of OS where one or more tasks are spread among two or more computers.
Distributed
A(n) ______ is used by the OS to translate between high-level programming languages and low-level hardware interpretation.
Driver
The three primary methods of authenticating a user to a system are:
Username/Password
Tokens
Biometrics
On a Windows system, the C:\%Systemroot%\_______ directory contains built-in system files, programs, and commands.
System32
What special identity group exists on Windows 2K and earlier systems that cannot be manually updated and may have Full Control permissions by default?
Everyone
________ access control uses security labels to enforce the system’s security policy.
Mandatory
The Windows _______ attribute protects the file from being overwritten or modified by any user.
Read-Only
______ IA measures assure data delivery is proven to be from a reliable source,
Non-Repudiation
_______ is the mechanism by which a system determines the level of access an authenticated user has to system resources.
Authorization
What determines what data classification will be in a Mandatory Access Control philosophy?
The data classification security policy of the organization.
All Windows systems provide the capability of using discretionary access control lists in assigning file permissions. (True or False)
False
What are the three core functions of an system?
Process Management
Device Management
File System Management
_______ assurance measures ensure reliable access to data and services for authorized users.
Availability