Mod 5 Flashcards

1
Q

This controls nearly all functions of a computer provides a means for interaction among users software and Hardware

A

Operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allows the user to interface with applications system software and Hardware

A

OS interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The heart of the OS manages the interaction between each layer

A

OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three core functions of the OS

A

File system management
Process Management
device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This defines the way data is named stored organized and accessed on a hard drive it can be compared to a filing cabinet for each drawer correlates to a disk volume each folder correlates to a directory in the papers within the folders correlate to files or data on the system

A

A file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A singular named resource that is used for storing information or data

A

A file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is an executing instance of an application

A

A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any hardware component or peripheral attached to the computer

A

A device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The communications path between the OS and these devices is made possible through special programs called what

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Only one user can perform a task at any given time

A

Single-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Only one user can perform multiple tasks at a time

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One or more tasks are spread among two or more computers

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operates in a network environment allowing user to connect to another computer or server to retrieve information

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provides various services including email file sharing and printer access as well as ensuring security to other computers or clients across the network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what

A

Information assurance IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the five information assurance risk management techniques

A
Confidentiality 
integrity 
availability 
non-repudiation 
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Assurance that information is not disclosed to unauthorized individuals processes or devices

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assurance that no unauthorized modification or destruction of information occurred

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assurance of reliable access to data in services for authorized users

A

Availability

20
Q

Assurance that data delivery is proven to be from a reliable source

A

Non-repudiation

21
Q

Assurance of properly verifying a user’s credentials

A

Authentication

22
Q

The privilege account on Linux systems is

A

Root

23
Q

Privileged account on Windows system is

A

Administrator

24
Q

What are the three types of Access Control

A

Discretionary Access Control DAC
mandatory Access Control Mac
role-based Access Control rbac

25
Q

Commonly referred to as permissions and is implemented using access control lists ACLs

A

Discretionary Access Control

26
Q

OS enforces the system security policy using security labels

A

Mandatory Access Control Mac

27
Q

Access decisions are based on each accounts roll or functional position………. is used for processes not files

A

Role-based Access Control rbac

28
Q

This helps ensure the confidentiality and integrity aspects of IA or attainable

A

Logging

29
Q

This is a record of system or user activities and can contain events generated either locally or from a remote system

A

Log file

30
Q

This is when computer data is copied or archived usually to a separate location in for the purpose of data recovery should data loss occur

A

Backup

31
Q

What are the three main types of user accounts that Windows uses

A

Built-in
local
domain

32
Q

Account authenticated by the local machine, credentials are maintained in a local database called the security accounts manager Sam

A

Local

33
Q

Account authenticated by domain controller

A

Domain

34
Q

This is a centralized server in a Windows Network that stores domain account credentials in a database called active directory

A

Domain controller

35
Q

In this model each Windows system is considered stand alone with regards to Authentication

A

The workgroup

36
Q

This model A collection of computers sharing common configurations resources and security principles

A

Domain model

37
Q

These contain profiles which are a collection of folders containing user personal data and preferences

A

Subdirectories

38
Q

Windows 7 replaces the documents and settings with what to store profiles

A

User’s directory

39
Q

This contains all OS files

A

System root folder

40
Q

What contains most of the built-in Windows system files programs and commands

A

System 32

41
Q

Any characteristic of a file or directory, on / off type features

A

Attribute

42
Q

These may have varying values either the name size times dates Etc

A

Properties

43
Q

Mechanism by which a system securely identifies a user

A

Authentication

44
Q

Mechanism by which a system determines the level of access an authenticated user has two system resources, files and directories

A

Authorization

45
Q

Windows OS utilize the __________ _____ ________, which provides the capability of a signing file and directory permissions using _______________ _________ _______ ______.

A

New Technology file system (NTFS)

DISCRETIONARY ACCESS CONTROL LIST (DACL)

46
Q

This is implemented on directories not files

A

Sharing

47
Q

When access locally ______ ___________ are ignored

A

Share permissions