Lesson 11 Flashcards
The operating system’s role in the protection of the system from physical threats involves:
providing tools to enable system backups and restoration of the OS itself, files, programs and data
The two types of OS backups are:
File backups and system image backups
Computer security is:
the maintenance of system integrity, availability and confidentiality at all times
The operating system uses _____ to ensure users have authorized access to the computer system.
The OS uses authentication to ensure that a user accessing a program is authorized or legitimate.
A program which stands as a barrier between a computer system and external traffic is known as _____.
a firewall
Which software is used to process instructions and coordinate between devices?
Operating system
Which system resource is most likely to use IRQ?
The hardware will get the CPU’s attention using IRQ. (‘hey, there’s something new here’)
answer: hardware
Which of the following would be the most appropriate description of how DMA is used?
DMA channels allow connection between hardware device and memory
Which of the following is software that enables you to perform a specific function?
An application
You have inserted the USB cable for an external hard drive. Which of the following most describes the process or tool that allows the device to be recognized and usable by the operating system?
PnP
PnP, or plug-and-play, ensures that devices can be plugged in and used/identified by the OS. Behind the scenes, the OS communicates with the hardware, using software to identify the device.
An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____.
integrity, confidentiality, availability
When implementing OS security policies and procedures, how often should organizations review them?
Organizations should review their OS security policies and procedures quarterly or annually. When there are any minor or major changes in the organization’s assets, infrastructure or networks, all policies and procedures should be updated.
Which policy includes both the incident response policy and the disaster recovery plan?
Business Continuity Plan
Which policy informs users on how to handle an organization’s confidential or sensitive information?
The main objective of the information security policy is to inform users that there are guidelines that they will be held accountable for while handling sensitive data for the organization. These policies can be broken down into areas such as how employees uses IT assets, how they use the network, and rules about internet usage.
Which statement below is not a subject that would be included in an Access Control Policy (ACP)?
Installing a firewall
If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
Data loss prevention (DLP) uses pattern recognition to prevent sensitive data from leaving the corporate network.
If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?
Scanning emails for viruses
Which of the following are NOT a method to deliver network security?
Over the telephone
When can a network security hardware appliance stop threats on the network?
When it is installed in line.
A multi-layered approach to network security is best because _____.
Different types of network security systems focus on different threats and vulnerabilities
Live threat-intelligence helps the firewall to identify and stop _____.
Threats that the firewall may have never seen before.
A firewall can be used to direct and control traffic _____.
both coming in and going out of your network
What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall’s access policy protection?
The next-generation firewall is the latest type of firewall (as of 2016) that can stop the most advanced and evasive threats.
What is the maximum number of zones that can be associated to a firewall?
Firewalls can potentially have many of zones associated with them. Simple networks usually have between two and four zones. More complex networks can have hundreds of zones. The more zones that are managed by the firewall, the more complex and enterprise-grade your firewall is likely to be.