Module 6 Flashcards

1
Q

T/F
Operating System plays a key role in computer system security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F
Any vulnerability at the operating system level opens the entire system to attack

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F
The more complex and powerful the operating system, the more likely it is to have no vulnerabilities to attack

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ must be on guard to arm their operating systems with all available defenses against attack

A

System administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Capability of a system to do its mission in the presence of attacks, failures, or accidents

A

System Survivability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What key property is:
Strategies for repelling attacks

A

Resistance to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key property is:
Strategies for detecting attacks and evaluating damage

A

Recognition of attacks and damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What key property is:
Strategies for limiting damage, restoring information or functionality, maintaining or restoring essential services

A

Recovery of essential and full services after attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What key property is:
Strategies improving system survivability based on knowledge from prior intrusions

A

Adaptation and evolution to reduce effectiveness of future attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities of Single computer (without e-mail or Internet)

A

Passwords, viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerabilities of LAN connected (without Internet)

A

Sniffers, spoofing (+passwords, viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilities of LAN connected (with Internet)

A

E-mail, Web servers, FTP, Telnet (+sniffers, spoofing, passwords, viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F
Backup and recovery are essential for most computing systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Many system managers use a ____.

A

Layered Backup Schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F
Backups stored on-site are crucial to disaster recovery

A

False (Off-site dapat para efas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Written security procedures should recommend:

A

(FRGCNGR):
oFrequent password changes
oReliable backup procedures
oGuidelines for loading new software
oCompliance with software licenses
oNetwork safeguards
oGuidelines for monitoring network activity
oRules for terminal access

17
Q

T/F
A gap in system security can be malicious or not

A

True

18
Q

Intrusions can be classified as:

A

oDue to uneducated users and unauthorized access
oPurposeful disruption of the system’s operation
oPurely accidental

19
Q

T/F
A breach of security severely does not damage the system’s credibility

A

False

20
Q

Any breach of security or modification of data that was not the result of a planned intrusion

A

Unintentional Intrusions

21
Q

A hacker taking over computers flood a target site with demands for data and tasks causing a computer to perform repeated unproductive task.

A

Denial of service (DoS)

22
Q

Unauthorized users gain access to search through secondary storage for information they don’t have the privilege to read.

A

Browsing

23
Q

Unauthorized users monitor or modify a user’s transmission

A

Wire Tapping

24
Q

Entering systems by guessing authentic passwords

A

Repeated Trials

25
Q

Unspecified and undocumented entry point

A

Trap Doors

26
Q

Use of discarded materials to enter the system illegally.

A

Trash Collection

27
Q

Small programs written to alter how a computer operates without permission of the user

A

Viruses and Worm

28
Q

____ must be self-executing and self-replicating

A

Viruses

29
Q

Infects files on the computer, normally executable files

A

File infector virus

30
Q

Viruses that reside in memory and infect any clean executable program that runs on that computer.

A

File infector virus

31
Q

Infects the boot record, the system area of a floppy disk or hard drive.

A

Boot sector virus

32
Q

These viruses activate whenever the user boots up the computer.

A

Boot sector virus

33
Q

Infects the boot record of a disk, saving a legitimate copy in a different location on the volume.

A

Master Boot Record Virus

34
Q

Infects both the boot record and program files, making them difficult to repair.

A

Multipartite virus

35
Q

Virus that must be removed all at once or a single instance of the virus will infect the system again.

A

Multipartite virus

36
Q

Infects data files, newer versions infect other program files.

A

Macro virus

37
Q

With this virus, users should disable automatic execution of macros on files they don’t trust.

A

Macro virus