Day 1 Mod 5 Flashcards

1
Q

Communication paths between the OS and devices are made possible through special programs called what?

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any hardware component or peripheral device that is attached to a computer is known as

A

A device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is an executing instance of an application

A

A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A singular named resource used for storing information or data

A

File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The OS interfaces with data on the hard drive through this, it defines the way data is named, stored, organized, and accessed on the hard drive.
Like a file cabinet
Drawer=disk volume
Folder =directory
Papers=files
A

File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What does an operating system control and what four things does it provide a means of interacting with?
U
A
S
H
A

controls nearly all functions of a computer

Provides a means of interacting with users system software applications and Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Every OS performs at least three core functions what are they
F
P
D

A

File system management
Process Management
Device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is the mechanical, magnetic, electronic, and electrical components of a computer

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This allows the user to interface with applications, system software, and Hardware

A

OS interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The heart of the OS, manages interaction between layers.

A

OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System software, also known as the OS can be divided into two parts. What are they?

A

OS interface

OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another name for executable code designed to carry out specific tasks on the computer, also known as programs or software.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the OS interfaces a user interacts with?

A

GUI graphical user interface

CLI command line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Has only one user and can perform a task at any given time

A

Single user single-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Only one user can perform multiple tasks at a time

A

Single user multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One or more users can perform one or more tasks each at one time. Unix or Windows based

A

Multi user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Operates in a networked environment allowing a user to connect to another computer or server to retrieve information. Unix or Windows based

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

provides various services including email file sharing and printer access as well as ensuring security to other computers or clients across a network. Email server web server print server

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

One or more tasks are spread among two or more computers a cluster of machines like google. Com

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what is known as?

A

Information assurance IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Information assurance or IA incorporates five risk management measures or techniques what are they?
C
I 
A
N
A
A
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Need to know

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Assurance that no unauthorized modification or destruction of information occurred.
Trust

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Assurance of reliable access to data and services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Assurance that data delivery is proven to be from a reliable source.
Can’t deny

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Assurance of properly verifying a user’s credentials.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This ensures users are properly identified using account credentials such as.
Username and or password
Card or token
Biometrics

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Once a user is authenticated, os's provide mechanisms to ensure data may only be accessed by authorized users. There are four mechanisms to accomplish this what are they?
P
A
L
B
A

Privileged versus non-privileged
Access Control
Logging
Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The IA availability measure implements this principle, where non-privileged user accounts are only granted access to what is authorized.

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

OSS provide this type of user account with full access and this other type of user account with limited access what are the accesses called?

A

Privileged and non-privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This is a mechanism for controlling access to system resources thereby ensuring resource availability.

A

Access Control

32
Q

The three most common forms of Access Control are?
D
M
R

A

DAC discretionary Access Control
Mac mandatory Access Control
Rbac role-based Access Control

33
Q

Commonly referred to as permissions and is implemented using access control list or ACL will list account permissions to a specific resource.
User-controlled permissions

A

DAC discretionary Access Control

34
Q

Os’s enforce the system security policy using security labels for example need to know what type of act access control is this.

A

Mac mandatory Access Control

35
Q

Access decisions are based on each accounts roll or functional position this is used for processes not files. What type of Access Control is it?

A

Rbac role-based Access

36
Q

Os’s provide these capabilities to ensure the confidentiality and integrity aspects of IA are attainable.

A

Logging capabilities

37
Q

This is a record of system or user activities that can contain events generated either locally or from a remote system and can be stored locally however some os’s provide the ability to consolidate them all in a centralized Repository.

A

Log files

38
Q

This mechanism ensures system restoration after data loss, performing it supports is a integrity and availability measures.

A

Backups

39
Q

This provides a consistent and reliable platform that is easy to use and is chosen by many popular application programs they are the most widely used in the world today and can be utilized in office and home environments although they are a Mainstay in both Commercial and Military organizations.

A

Windows

40
Q

On this OS it is the process of determining whether someone is in fact who they declare to be.

A

Windows Authentication

41
Q

Windows uses three main types of user accounts what are they?
B
L
D

A

Built-in
Local
Domain

42
Q

This account type is created automatically when the OS is installed and consists of two types of accounts.
Administrator which is the user account with the highest level of Privileges and permissions this account cannot be deleted.
Yest, intended for temporary access when an individual user account does not exist they are greatly limited and do not require a password to access the system, cannot be deleted as well.

A

Built-in

43
Q

Account authenticated by the local machine. Local account credentials are maintained in a local database.

A

Local

44
Q

Local account credentials are maintained in a local database called?

A

Sam security accounts manager

45
Q

Account authenticated by a domain controller.

A

Domain

46
Q

This is a centralized server in a Windows Network that stores domain account credentials in a database called active directory. Authenticates accounts.

A

Domain controller

47
Q

Information that is maintained by a centralized database is known as?

A

An Active directory

48
Q

In this model each Windows system is considered stand alone with regards to Authentication. when are user attempts to login with a local account the computer communicates with its local Sam for Authentication.

A

Workgroup model

49
Q

This model is a collection of computers sharing common configurations, resources, and security principles. Its information is maintained by a centralized database known as an active directory.

A

Domain model

50
Q

Windows uses this type of structure in which all directories and files fall under a disk volumes root directory.

A

Hierarchical directory structure

51
Q

This contains a subdirectory for each user that has logged on to the system.

A

Documents and settings folder

52
Q

These are a collection of folders containing user personal data and preferences.

A

Subdirectories

53
Q

When a user logs onto a system for the first time and or does not have a profile, the settings contained in this profile are used to create the user’s profile.

A

Default user profile

54
Q

This profile is used add settings and programs that affect all users that log on to the system.

A

All users profile

55
Q

This file folder contains folders and files of installed third-party software.

A

Program files folder

56
Q

This folder contains all the OS files.

A

System root folder

57
Q

This directory contains most of the built-in Windows system files, programs, and commands.

A

System32 directory

58
Q

These are defined as any characteristic of a file or directory. These are also on and off type features.

A

Attributes

59
Q

These may have varying values for example name, size, times, dates.

A

Properties

60
Q
Name the five examples of file directory attributes.
A
R
C
H
E
S
A
Archive
Read only
Compression
Hidden
Encryption
System
61
Q

This attribute allows backup programs to know which files to backup.

A

Archive

62
Q

This attribute protects the file from being overwritten or modified.

A

Read only

63
Q

Attribute for a Compressed file or directory NTFS only

A

Compression

64
Q

Attribute that hides from standard directory list listings and common users.

A

Hidden

65
Q

Attribute type for a Encrypted file or directory NTFS only

A

Encryption

66
Q

This attribute gives General protection from common user access.

A

System

67
Q

Mechanism by which a system security identifies a user.

A

Authentication

68
Q

Mechanism by which a system determines the level of access a user has two system resources.

A

Authorization

69
Q

This file system provides the capability of assigning file and directory permissions using discretionary Access Control list or dacl

A

New technology file system NTFS

70
Q

This permission allows for viewing and listing of files and subfolders, permits viewing of file contents, and is static and does not change.

A

Read

71
Q

This permission allows adding a files and subfolders, and permits writing to a file.

A

Write

72
Q

this permission permits viewing and listing of files and subfolders as well as file execution; inherited by files and folders, and permits viewing file contents and file execution.

A

Read and execute

73
Q

This permission permits viewing a listing of files and subfolders; inherited by folders only and means nothing for files.

A

List folder contents

74
Q

This permission allows for reading and writing a files and subfolders, allows deletion of the folder, and permits reading and writing of the file. Also allows deletion of the file and cannot change permissions.

A

Modify

75
Q

This permission allows for Reading, Writing, changing app permissions, and deleting of files and subfolders. It also permits Reading Writing changing of permissions and deleting of the file.

A

Full control

76
Q

This is implemented on directories not files and is accessed from over a network via this directory.

A

Shared directory, only folders can be shared not files and when access locally these rules have no impact on the directory.