Unit 6 - Module 13 Flashcards

1
Q

operating system

A

A computer’s control program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The technology of network communications are subject to two general forms of risk:

A
  1. The technology of network communications are subject to two general forms of risk:
  2. Risks from equipment failure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operating system control objectives may not be achieved

  • because of flaws in the operating system that are exploited either accidentally or intentionally.
  • because the log-on procedure is cumbersome.
  • because the system chosen is incompatible with the operating system.
  • because the application access control list is incorrect.
A

because of flaws in the operating system that are exploited either accidentally or intentionally.

The correct answer is “because of flaws in the operating system that are exploited either accidentally or intentionally.” Operating system control objectives may not be achieved because of flaws in the operating system that are exploited either accidentally or intentionally. Accidental threats include hardware failures that cause the operating system to crash. Intentional threats to the operating system are most commonly attempts to illegally access data or violate user privacy for financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The operating system is

  • the computer’s control program.
  • developed in-house.
  • a part of the enterprise resource planning system.
  • developed by the same vendor that creates the accounting application.
A

the computer’s control program.

The correct answer is “the computer’s control program.” The operating system is the computer’s control program. It allows users and their applications to share and access common computer resources, such as processors, main memory, databases, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is considered an unintentional threat to the integrity of the operating system?

a virus that formats the hard drive
the systems programmer accessing individual user files
a hardware flaw that causes the system to crash
a hacker gaining access to the system because of a security flaw
A

a hardware flaw that causes the system to crash

The correct answer is “a hardware flaw that causes the system to crash.” A hardware flaw that causes the system to crash is an unintentional threat to the integrity of the operating system. Modern computer hardware is very reliable, but problems do happen. Common flaws occur in moving parts such as spinning discs. Disc drive failure is called a head crash and results in the read/write heads touching the disc surface, destroying it. To protect the data, backups are done on a regular basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is considered an intentional threat to the integrity of the operating system?

  • a computer operator who deletes a file by mistake
  • individuals who browse the operating system to identify and exploit security flaws
  • a regional power failure
  • the help desk accessing individual user files
A

individuals who browse the operating system to identify and exploit security flaws

The correct answer is “individuals who browse the operating system to identify and exploit security flaws.” These include systems programmers who access individual user files and operating systems developers who include a back door to avoid normal login procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common method of password control is

passwords of undefined length.
numeric passwords.
never expiring passwords.
the reusable password.
A

the reusable password.

The correct answer is “the reusable password.” The most common method of password control is the reusable password. The user defines the password to the system once and then reuses it to gain future access. The quality of the security a reusable password provides depends on the quality of the password itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly