Day 1 Flashcards

1
Q

The Windows _____ attribute generally protects system files from common user access.

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mobile device uses a(n) ______ computer architecture.

A

RISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The NTFS _____ permission is applied to files and permits the viewing or accessing of file contents.

A

Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The principle of least privilege, where non-privileged user accounts are only granted access to what is authorized is implemented through _____.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is a category of OS where one or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ______ is used by the OS to translate between high-level programming languages and low-level hardware interpretation.

A

Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The three primary methods of authenticating a user to a system are:

A

Username/Password
Tokens
Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On a Windows system, the C:\%Systemroot%\_______ directory contains built-in system files, programs, and commands.

A

System32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What special identity group exists on Windows 2K and earlier systems that cannot be manually updated and may have Full Control permissions by default?

A

Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ access control uses security labels to enforce the system’s security policy.

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Windows _______ attribute protects the file from being overwritten or modified by any user.

A

Read-Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ IA measures assure data delivery is proven to be from a reliable source,

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ is the mechanism by which a system determines the level of access an authenticated user has to system resources.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What determines what data classification will be in a Mandatory Access Control philosophy?

A

The data classification security policy of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All Windows systems provide the capability of using discretionary access control lists in assigning file permissions. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three core functions of an system?

A

Process Management
Device Management
File System Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_______ assurance measures ensure reliable access to data and services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The built-in ________ user account has the highest level of privileges and permissions.

A

Administrator

19
Q

What OS core function involves placing a file called test.txt in the student directory, which is located on a specific volume of the first hard disk on the system?

A

File System Management

20
Q

In JCAC, Mod 5 requires Questionmark tests to be administered by a qualified instructor. When the answer to a question is in error, the instructor does not have permissions to make the change. Questionmark only allows the SME to alter questions/answers when necessary. What access control techniques was built into the Questionmark application to serve this requirement?

21
Q
(Choose all that apply) Which of the following are considered attributes of a Windows file? 
         Size 
         Archive 
         Name
         System
A

Archive, System

22
Q
Depending upon the role performed, an OS may fall into one or more categories. Which of the following is NOT one of those categories?
    Dimensional
    Distributed
    Server
    Client
A

Dimensional

23
Q

A(n) ______ is defined as executable code designed to carry out specific tasks on the computer.

A

Application

24
Q

What are the four means of interaction that OS’s rely on to communicate at various layers?

A

Hardware, System Software, Application, User

25
_______ assurance measures ensure information is not disclosed to unauthorized personnel.
Confidentiality
26
The OS _____ is the system software component that manages the interaction between each layer and is the heart of the OS.
Kernel
27
The settings contained in the Windows ______ ______ folder are used to create a user profile when they log in for the first time.
Default User
28
``` (Choose all that apply) Which of the following are considered properties of a Windows file? Archive Size Name Read Only ```
Name, Size
29
______ consists of the acknowledgement and management of system vulnerabilities.
Information Assurance
30
The C:\%systemroot% is the same name as C:\_____ directory in Windows XP and newer.
Windows
31
Domain accounts are authenticated by _____ _____ on the Domain Controller.
Active Directory
32
________ assurance measures ensure proper verification of user credentials.
Authentication
33
What OS core function involves a user attaching a new printer to the computer and having to install a compatible driver in order to print a document to that printer?
Device Management
34
On a Windows system, the C:\________ ______ directory contains folders and files of installed software like MS Office, Adobe Acrobat, Symantec Antivirus, etc.
Program Files
35
What OS core function involves the OS creating and managing the process resources, such as memory management. when a user executes a word processing application?
Process Management
36
In a file's properties Window, what would a missing security tab indicate?
The file resides on a FAT file system
37
A _____ is a singular named resource used for storing info or data.
File
38
In Windows 7, the _____ directory replaced the Documents and Settings directory, to store user profiles.
C:\Users
39
``` (Choose all that apply) Which of the following are associated with authorization? DACL Access Control Credentials Common Access Card or Token ```
Access Control, DACL
40
The OS _______ is the component that provides user interaction with software and hardware graphically or from a command line.
Interface
41
``` Which of the following is NOT a core function of an OS? Process Management User Management Device Management File System Management ```
User Management
42
A(n) ______ is an executing instance of an application.
Process
43
Which tenant of IA measures, ensures no unauthorized modification or destruction of data occurs?
Integrity
44
Which security principle is defined as a system that grants users only the rights necessary for them to perform their work?
RBAC