Basic Concepts Flashcards
The basics of OSS that you should know.
What are the three main components of the CIA Triad?
a) Control, Integrity, Availability
b) Confidentiality, Integrity, Accessibility
c) Confidentiality, Integrity, Availability
d) Control, Accessibility, Authentication
Answer:
c) Confidentiality, Integrity, Availability
Explanation:
The CIA Triad is a fundamental model in security, representing Confidentiality (secrecy, privacy), Integrity (only authorized modification), and Availability (authorized access).
Which of the following is an external security threat?
a) Unauthorized data modification
b) Viruses
c) Misuse of privileges
d) Unauthorized use of resources
Answer:
b) Viruses
Explanation:
Viruses are explicitly mentioned as an external security threat in the context of operating system security.
Which security mechanism uses encryption and authentication?
a) Protection
b) Security
c) Access Control
d) Intrusion Detection
Answer:
b) Security
Explanation:
The document states that security uses mechanisms like encryption and authentication.
What does protection primarily deal with in an operating system?
a) External threats
b) Unauthorized access
c) Access to system resources
d) Complex queries
Answer:
c) Access to system resources
Explanation:
Protection is defined as dealing with access to certain system resources.
Which of the following is considered a violation of availability?
a) Unauthorized reading of data
b) Unauthorized modification of data
c) Unauthorized destruction of data
d) Theft of service
Answer:
c) Unauthorized destruction of data
Explanation:
Unauthorized destruction of data is explicitly listed as a breach of availability, also known as a Denial of Service (DOS).
Which type of malware can replicate itself and consume system resources?
a) Trojan Horse
b) Virus
c) Worm
d) Trap Door
Answer:
c) Worm
Explanation:
A worm can destroy a system by using its resources to extreme levels, generating multiple copies and claiming all the resources.
What is the primary purpose of authentication?
a) To grant access to system resources
b) To identify users and verify their identity
c) To protect against external threats
d) To allocate system resources
Answer:
b) To identify users and verify their identity
Explanation:
Authentication deals with identifying each user in the system and ensuring they are who they claim to be.
Which authentication method uses a hardware device to create a secret key?
a) One Time Password
b) User Key/User Card
c) Secret Key
d) User Attribute Identification
Answer:
c) Secret Key
Explanation:
A hardware device can create a secret key related to the user ID for login.
What is a key security issue that OS design should address?
a) User-friendly interface
b) Fast processing speed
c) Preventing unauthorized privilege gain
d) Efficient memory management
Answer:
c) Preventing unauthorized privilege gain
Explanation:
A key security issue in OS design is to detect and prevent users and malware from gaining unauthorized privileges.
What type of intruder exploits a legitimate user’s account?
a) Misfeasor
b) Masquerader
c) Clandestine user
d) Malware
Answer:
b) Masquerader
Explanation:
A masquerader is an individual who is not authorized to use the computer and penetrates a system’s access controls to exploit a legitimate user’s account.
Which of the following is NOT a general means of authenticating a user’s identity?
a) Something the individual knows
b) Something the individual creates
c) Something the individual possesses
d) Something the individual is
Answer:
b) Something the individual creates
Explanation:
The four general means of authenticating a user’s identity are: something the individual knows, possesses, is (static biometrics), or does (dynamic biometrics).
What is the function of access controls?
a) To detect intrusions
b) To verify user identity
c) To implement a security policy specifying access rights
d) To encrypt data
Answer:
c) To implement a security policy specifying access rights
Explanation:
Access controls implement a security policy that specifies who or what may have access to each specific system resource and the type of access permitted.
What is an example of access control?
a) Intrusion Detection System
b) Firewall
c) Antivirus software
d) Encryption software
Answer:
b) Firewall
Explanation:
A firewall is given as an example of access control.
What is the purpose of an Intrusion Detection System (IDS)?
a) To prevent unauthorized access
b) To identify if an intrusion has occurred
c) To encrypt sensitive data
d) To authenticate users
Answer:
b) To identify if an intrusion has occurred
Explanation:
An IDS analyzes various system events to identify if an intrusion has occurred.
Which type of IDS monitors the characteristics of a single host?
a) Network-based IDS
b) Host-based IDS
c) Hybrid IDS
d) Distributed IDS
Answer:
b) Host-based IDS
Explanation:
Host-based IDS monitors the characteristics of a single host.
Which of the following is a logical component of an IDS?
a) Firewall
b) Sensor
c) Antivirus
d) Router
Answer:
b) Sensor
Explanation:
Sensors are responsible for collecting data, such as log files and system call traces, and are a logical component of an IDS.
What can an IDS detect?
a) Only human intrusion
b) Only malicious software intrusion
c) Both human and malicious software intrusion
d) Hardware failures
Answer:
c) Both human and malicious software intrusion
Explanation:
IDS can detect both human intrusion and malicious software intrusion.
Which security concept ensures that data is only modified by authorized parties?
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
Answer:
b) Integrity
Explanation:
Integrity ensures that data is only modified by authorized parties and in authorized ways.
What is a denial-of-service (DoS) attack a violation of?
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
Answer:
c) Availability
Explanation:
A Denial of Service (DoS) attack prevents legitimate use, which is a violation of availability.
Which countermeasure involves verifying the identity of a system entity?
a) Access Control
b) Intrusion Detection
c) Authentication
d) Firewall
Answer:
c) Authentication
Explanation:
Authentication is the process of verifying the identity that a system entity claims to be.
Define computer security.
Answer:
Computer security is preserving the integrity, availability, and confidentiality of information system resources.
What is confidentiality in the context of the CIA Triad?
Answer:
Confidentiality means that only those who are authorized to know can know (secrecy, privacy).
Explain the difference between protection and security in operating systems.
Answer:
Protection deals with access to system resources, handling simple queries and internal threats, and implements authorization mechanisms.
Security grants access to specific users, handles convoluted queries, and addresses external security threats using mechanisms like encryption and authentication.
List three common threats to protection and security.
Answer:
Virus, Trojan Horse, Worm