Day 1 Flashcards

1
Q

The Windows _____ attribute generally protects system files from common user access.

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mobile device uses a(n) ______ computer architecture.

A

RISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The NTFS _____ permission is applied to files and permits the viewing or accessing of file contents.

A

Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The principle of least privilege, where non-privileged user accounts are only granted access to what is authorized is implemented through _____.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is a category of OS where one or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ______ is used by the OS to translate between high-level programming languages and low-level hardware interpretation.

A

Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The three primary methods of authenticating a user to a system are:

A

Username/Password
Tokens
Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On a Windows system, the C:\%Systemroot%\_______ directory contains built-in system files, programs, and commands.

A

System32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What special identity group exists on Windows 2K and earlier systems that cannot be manually updated and may have Full Control permissions by default?

A

Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ access control uses security labels to enforce the system’s security policy.

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Windows _______ attribute protects the file from being overwritten or modified by any user.

A

Read-Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ IA measures assure data delivery is proven to be from a reliable source,

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ is the mechanism by which a system determines the level of access an authenticated user has to system resources.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What determines what data classification will be in a Mandatory Access Control philosophy?

A

The data classification security policy of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All Windows systems provide the capability of using discretionary access control lists in assigning file permissions. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three core functions of an system?

A

Process Management
Device Management
File System Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_______ assurance measures ensure reliable access to data and services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The built-in ________ user account has the highest level of privileges and permissions.

A

Administrator

19
Q

What OS core function involves placing a file called test.txt in the student directory, which is located on a specific volume of the first hard disk on the system?

A

File System Management

20
Q

In JCAC, Mod 5 requires Questionmark tests to be administered by a qualified instructor. When the answer to a question is in error, the instructor does not have permissions to make the change. Questionmark only allows the SME to alter questions/answers when necessary. What access control techniques was built into the Questionmark application to serve this requirement?

A

RBAC

21
Q
(Choose all that apply) Which of the following are considered attributes of a Windows file? 
         Size 
         Archive 
         Name
         System
A

Archive, System

22
Q
Depending upon the role performed, an OS may fall into one or more categories. Which of the following is NOT one of those categories?
    Dimensional
    Distributed
    Server
    Client
A

Dimensional

23
Q

A(n) ______ is defined as executable code designed to carry out specific tasks on the computer.

A

Application

24
Q

What are the four means of interaction that OS’s rely on to communicate at various layers?

A

Hardware, System Software, Application, User

25
Q

_______ assurance measures ensure information is not disclosed to unauthorized personnel.

A

Confidentiality

26
Q

The OS _____ is the system software component that manages the interaction between each layer and is the heart of the OS.

A

Kernel

27
Q

The settings contained in the Windows ______ ______ folder are used to create a user profile when they log in for the first time.

A

Default User

28
Q
(Choose all that apply) Which of the following are considered properties of a Windows file?
    Archive 
    Size 
    Name 
    Read Only
A

Name, Size

29
Q

______ consists of the acknowledgement and management of system vulnerabilities.

A

Information Assurance

30
Q

The C:\%systemroot% is the same name as C:\_____ directory in Windows XP and newer.

A

Windows

31
Q

Domain accounts are authenticated by _____ _____ on the Domain Controller.

A

Active Directory

32
Q

________ assurance measures ensure proper verification of user credentials.

A

Authentication

33
Q

What OS core function involves a user attaching a new printer to the computer and having to install a compatible driver in order to print a document to that printer?

A

Device Management

34
Q

On a Windows system, the C:\________ ______ directory contains folders and files of installed software like MS Office, Adobe Acrobat, Symantec Antivirus, etc.

A

Program Files

35
Q

What OS core function involves the OS creating and managing the process resources, such as memory management. when a user executes a word processing application?

A

Process Management

36
Q

In a file’s properties Window, what would a missing security tab indicate?

A

The file resides on a FAT file system

37
Q

A _____ is a singular named resource used for storing info or data.

A

File

38
Q

In Windows 7, the _____ directory replaced the Documents and Settings directory, to store user profiles.

A

C:\Users

39
Q
(Choose all that apply) Which of the following are associated with authorization?
     DACL
     Access Control
     Credentials
     Common Access Card or Token
A

Access Control, DACL

40
Q

The OS _______ is the component that provides user interaction with software and hardware graphically or from a command line.

A

Interface

41
Q
Which of the following is NOT a core function of an OS?
   Process Management 
   User Management
   Device Management
   File System Management
A

User Management

42
Q

A(n) ______ is an executing instance of an application.

A

Process

43
Q

Which tenant of IA measures, ensures no unauthorized modification or destruction of data occurs?

A

Integrity

44
Q

Which security principle is defined as a system that grants users only the rights necessary for them to perform their work?

A

RBAC