Operating Systems and Networks Flashcards

1
Q

Give three operating systems used by companies worldwide

A

Windows
Mac
Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operating Systems

A

Computer’s control program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OS Fundamental Control Objectives

A

The OS must protect

  1. itself from users
  2. users from other users
  3. users from themselves
  4. itself from itself
  5. itself from the environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OS Security Components

A

Log-on procedures
Access token
Access control list
Discretionary access privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats to OS Integrity

A

Privileged personnel who abuse authority
Individuals who browse the OS to identify and exploit security flaws
Individuals who insert computer viruses or other destructive programs into the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four OS Controls?

A

Access privileges
Password control
Virus control
Audit trail control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name four typical password problems

A

The password is

  1. Forgotten
  2. Not changed frequently
  3. Simple and easy to guess
  4. Displayed where others can see them (Post-It Syndrome)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoor

A

A software program that allows access into an operating system without going through normal log-on procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of malicious and destructive programs

A

Trojan Horse
Virus
Worm
Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of audit logs

A

Keystroke monitoring

Event monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three ways that audit trails support audit objectives

A

Detecting unauthorized access
Reconstructing events
Encourages personal accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer network

A

Collection of computers and devices connected via communication devices and transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intranet

A

A local or restricted communications network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet

A

A global system of interconnected computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extranet

A

A part of the intranet available on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the business risks associated with e-commerce?

A

IP Spoofing
Denial of Service (DOS) Attack
Equipment Failure

17
Q

What are the three network components

A

Communication lines

Hardware components Software

18
Q

Network Paradox

A

Networks exist to provide user access to shared resources, yet the
most important objective is to control such access

19
Q

Methods to avoid data collision

A

Polling
Token passing
Carrier sensing

20
Q

Four ways to control risks from subversive threats

A

Firewalls
Deep packet inspection
Encryption
Message control techniques

21
Q

What are the two general types of firewalls

A

Application level

Network level

22
Q

What are the benefits of Electronic Data Interchange (EDI)?

A
Data Keying (or Encoding)
Error reduction
Reduction of paper
Postage
Automated procedures
Inventory reduction
23
Q

EDI Controls

A

Transaction authorization and validation
Access control
EDI audit trail