Windows mod 5 Flashcards

1
Q

Controls nearly all functions of computer. Computers rely on this to provide a means for interaction among users, software, and hardware.

A

Operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The person using a computer/device. User interaction with software and hardware is provided through OS interfaces.

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executable code deigned to carry out specific tasks on the computer, also referred to as programs or software.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As OS consists of two parts:

OS Interface

OS Kernel

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows a user to interface with applications, system, and hardware.

A

OS Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The heart of an OS. Manages the interaction between a user, applications, and hardware.

A

OS Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The mechanical, magnetic, electronic, and electrical components of a computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An OS Interface with data on a hard drive through a file system.

  • file system
  • directory
  • file
A

File System Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defines the way data is named, stored, organized, and accessed.

A

File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a container used to organize files and data for use by an OS.

A

Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a singular named resource used to store information/data.

A

File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the OSs responsibility to allocate and protect resources for all processes on the system.

A

Process Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is an executing instance of an application.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The communications path between an OS and attached devices is made possible through special programs called device drivers.

A

Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is any hardware component or peripheral attached to a computer.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a computer program that operates or controls a device attached to a computer.

A

Device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is used as an interpreter

A

Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Only one user can perform a task at any given time.

A

Single user, single tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Only one user can perform multiple tasks (programs) at a time. (Not all mobile devices allow this.)

A

Single user, multi-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One or more users can perform one or more tasks at one time.

A

Multiuser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Two or more servers are grouped together, appearing as one system, providing a failover system with load balancing.

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

If a node in the cluster fails, the services on that node are picked up by other service nodes.

A

Failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Assurance that information is not disclosed to unauthorized individuals, processes, or devices. This is more comparable to “need to know” than a security level.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Assurance that no unauthorized modification or destruction of information occurred in transit.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Assurance of reliable access to data and services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Assurance that data delivery is proven to is proven to be from a reliable source.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Assurance of properly verifying a user’s credentials

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

non-privileged user accounts are only granted access to what is authorized.

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

the privileged account in Windows

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Permissions are implemented by an Access Control List (ACL).

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

details account permissions to a specific resource as determined by permissions set by the owner of that resource.

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

policies are set by an administrator using a policy tool. OSs enforce system security policy using security labels (e.g., need-to-know).

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Access decisions are based on each account’s role or functional position.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

is a record of system or user activities.

A

log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

occurs when computer data is copied or archived, usually to a separate location, and for the purpose of data recovery should data loss occur.

A

backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

is a sequence of events that begins when a system is powered on and ends once the OS kernel is loaded into memory space and begins executing.

A

boot process

41
Q

is a set of instructions embedded onto a ROM, PROM, or EEPROM that tells the device how to communicate with other hardware and software.

A

Firmware

42
Q

which creates cylinders, tracks, and sectors (commonly 512bytes in size) on the platters

A

low-level format

43
Q

groups consecutive sectors together and prepare a hard drive for storing a file system.

A

Partitioning

44
Q

groups sectors into addressable clusters used by a file system for storing and retrieving disk data.

A

high-level format

45
Q

provides the initial interface between major hardware components and the OS with a primary goal of finding and loading the OS.

A

Basic Input/Output System (BIOS)

46
Q

provides detailed information about the computer hardware and can be altered as the configuration changes by entering the BIOS setup.

A

CMOS

47
Q

occurs when a computer is initially powered on. The BIOS executes a POST (Power-On Self-Test)to initialize and test hardware components. The POST uses beep codes and/or light indicators for error notification.

A

cold boot

48
Q

(soft boot) occurs when an OS is restarted without an interruption of power. A POST is not performed during a warm boot.

A

warm boot

49
Q

initialize and test hardware components. This uses beep codes and/or light indicators for error notification.

A

POST

50
Q

contains a partition table identifying the location of all created partitions. Creation of additional partitions updates the existing partition table. it resides at the first physical sector of the drive (sector 0) and is not part of any partition. It is the first sector read from the boot device and it contains the information to continue the boot process. it is 512 bytes.

A

MBR

*max supported partition size is 2TB

51
Q

contains the hex value AA55 or 55AA, which classifies the MBR as valid.

A

magic number

52
Q

This is 64 byes and is located at byte offsets 446 through 509 (0x1BE to 0x1FD). It has space for four entries (16 bytes each) to describe each of the partitions.

A

partition table

53
Q

full access to physical memory is available.

A

real mode

54
Q

Access to memory is controlled.

A

protected mode

55
Q

one of the most dangerous types of malware attacks due to the ability to infect the MBR.

A

bootkit

56
Q

Is an improved method of booting due to its highly secure way of carrying out the boot process, checking the integrity of drivers and OS boot loaders that use verification and initialization of digitally signed code.

A

UEFI

57
Q

Uses Logical Block Addressing (LBA) in place of the Cylinder-Head-Sector (CHS) addressing used with MBR. This allows for 128 possible partitions with partition sizes of up to approximately 9.4ZBs (zettabytes).

A

The Globally Unique Identifier (GUID) Partition Table (GPT)

58
Q

defines the usable blocks on a disk and the number and size of partition entries that make up the partition table.

A

GPT Header

59
Q

Firmware is initialized.

A

Security (SEC)

60
Q

Low-level hardware is initialized.

A

Pre-EFI Initialization (PEI)

61
Q

UEFI drivers are loaded and executed.

A

Driver Execution Environment (DXE)

62
Q

A GPT or MBR determination is made based on boot configuration.

A

Boot Device Selection (BDS)

63
Q

Depending on the boot device selected, the firmware boots an OS loader, UEFI Shell, or UEFI application.

A

Transient System Load (TSL)

64
Q

UEFI program is cleared from memory and released to the OS.

A

Run Time (RT)

65
Q

Accounts automatically created when an OS is installed. At a minimum, every Windows system has an Administrator and Guest built-in account.

A

Built-In

66
Q

User account with the highest level of privileges and permissions. Users authenticated as Administrator can install software/devices, change system configuration settings, and manage other user accounts. This account cannot be deleted.

A

Administrator

Built-in

67
Q

Intended for temporary access when an individual user account does not exist.Guest account abilities are greatly limited, but a password is typically not required to access the system.

A

Guest

Built-in

68
Q

Account authenticated by the local machine. Local account credentials are maintained in a local database called the Security Accounts Manager (SAM).

A

Local

69
Q

Local account credentials are maintained in a local database

A

Security Accounts Manager (SAM)

70
Q

Account authenticated by a domain controller. A domain controller is a centralized server in a Windows network that stores domain account credentials in a database called Active Directory.

A

Domain

71
Q

A centralized server in a Windows network that stores domain account credentials

A

domain controller

72
Q

stores domain account credentials

A

Active Directory

73
Q

Each Windows system is considered standalone with regards to authentication.

A

workgroup

74
Q

When a user logs on to a system for the first time and/or does not have a profile, the settings contained in this directory are used to create the user’s profile.(C:\Documents and Settings\Default User prior to Windows 7)

A

Default

75
Q

The settings contained in are used to add settings and programs to existing accounts that affect all users that log on to the system.(C:\Documents and Settings\All Users prior to Windows 7)

A

Public

76
Q

contains folders and files of installed software, like Microsoft Office, Adobe Acrobat, Symantec Antivirus, or other optional third party and non-OS software.

A

Program Files

77
Q

Contains folders and files of the specific Windows OS and is referred to as “system root”.

A

Windows folder

78
Q

is used to identify the Windows directory name value for where the OS is installed.

A

%SystemRoot%

79
Q

contains most of the built-in Windows system files, programs, and commands.

A

System32 Folder

80
Q

contains a subdirectory for each user who has logged on to the system.

A

Users Folder

81
Q

are on/off type features.

A

attributes

82
Q

may have varying values, (e.g., name, size, times, dates)

A

properties

83
Q

Allows backup programs to know which files to backup.

A

Archive

A

84
Q

Protects the file from being over-written or modified.

A

Read-only

R

85
Q

Compressed file or directory (NTFS only)

A

Compression

C

86
Q

Hidden from standard directory listings and common users

A

Hidden

H

87
Q

Encrypted file or directory (NTFS only)

A

Encryption

E

88
Q

System file, generally protected from common user access.

A

System

S

89
Q

is a mechanism by which a system determines the level of access an authenticated user has to system resources (e.g., files and directories).

A

Authorization

90
Q

to assign file and directory permissions.

A

Discretionary Access Control Lists(DACL)

91
Q

is the most common file system offered by Microsoft.

A

New Technology File System

NTFS

92
Q

Meaning for Folders

Permits viewing and listing of files and subfolders

Meaning for Files

Permits viewing file contents

A

Read

93
Q

Meaning for Folders

Permits adding of files and subfolders

Meaning for Files

Permits writing to a file

A

Write

94
Q

Meaning for Folders

Permits viewing and listing of files and subfolders as well as file execution; inherited by files and folders

Meaning for Files

Permits viewing file contents and file execution

A

Read and Execute

95
Q

Meaning for Folders

Permits viewing a listing of files and subfolders; inherited by folders only

Meaning for Files

N/A

A

List Folder Contents

96
Q

Meaning for Folders

Permits reading and writing of files and subfolders; allows deletion of the folder

Meaning for Files

Permits reading and writing of the file; allows deletion of the file

A

Modify

97
Q

Meaning for Folders

Permits reading, writing, changing of permissions, and deleting of files and subfolders

Meaning for Files

Permits reading, writing, changing of permissions, and deleting of the file

A

Full Control

98
Q

This group cannot be manually updated because all accounts are considered members.

A

Everyone

99
Q

they only apply when the shared folder is accessed over the network.

A

Share permissions