Securing Operating Systems Flashcards

1
Q

Policy used to define an acceptable personal device one can use for work related access

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software used to police a BYOD

A

MDM (Mobile Device Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A code of conduct with organizational resources

A

AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An agreement used when dealing with intellectual property

A

NDA (non-disclosure agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File Extension used with Android Apps

A

.apk (android package kit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File Extension used with Apple iOS apps

A

.ipa (iOS app store package)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used along with Active Directory to authenticate a user on the Windows operating system. Uses secret key cryptography in order to access other nodes on the network.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User group with most permissions

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User group with Read & Write permissions but cannot modify key operating system files

A

Power User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User group that replaced Power Users after Win 7

A

Standard User (Users Group)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User group that has the same permissions as a Standard User but cannot access log files. Usually used as a temporary user and should be disabled.

A

Guest User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File system that tracks security in ACLs, which can hold permissions in Local Users and Groups

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Permissions that are applied only when a user is accessing a file or folder on the network

A

Share Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Permissions that are used to protect the file when the user is local

A

NTFS Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give the user all the other choices and ability to change permission. The user can also take ownership of the folder or any of its contents.

A

Full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Combines the read and execute permission with the write permission and further allow the the user to delete everything including the folder.

A

Modify

17
Q

Allows the user to view the contents of a folder and to navigate to its subdirectories. It does not grant the user access to the files in these directories unless that is specified in file permissions

A

List folder contents

18
Q

Combines the read and execute permissions with the write permission and further allows the user to delete every, including the folder.

A

Read and execute

19
Q

Allows the user to navigate the entire folder structure, the contents of the folder, view the contents of any files in the folder, and see ownership and attributes

A

Read permission

20
Q

Allows the user to create new entities within a folder

A

Write permissions

21
Q

Which share permissions Grant a user all the other permission as well as permission to take ownership and change permission

A

Full control

22
Q

Which share permission allows a user to overwrite, delete, and read files and folders?

A

Change permissions

23
Q

Which share permission allows a user to view the contents of the file and to see ownership and attributes?

A

Read permissions