Lesson 11 Flashcards
The operating system’s role in the protection of the system from physical threats involves:
providing tools to enable system backups and restoration of the OS itself, files, programs and data
The two types of OS backups are:
File backups and system image backups
Computer security is:
the maintenance of system integrity, availability and confidentiality at all times
The operating system uses _____ to ensure users have authorized access to the computer system.
The OS uses authentication to ensure that a user accessing a program is authorized or legitimate.
A program which stands as a barrier between a computer system and external traffic is known as _____.
a firewall
Which software is used to process instructions and coordinate between devices?
Operating system
Which system resource is most likely to use IRQ?
The hardware will get the CPU’s attention using IRQ. (‘hey, there’s something new here’)
answer: hardware
Which of the following would be the most appropriate description of how DMA is used?
DMA channels allow connection between hardware device and memory
Which of the following is software that enables you to perform a specific function?
An application
You have inserted the USB cable for an external hard drive. Which of the following most describes the process or tool that allows the device to be recognized and usable by the operating system?
PnP
PnP, or plug-and-play, ensures that devices can be plugged in and used/identified by the OS. Behind the scenes, the OS communicates with the hardware, using software to identify the device.
An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____.
integrity, confidentiality, availability
When implementing OS security policies and procedures, how often should organizations review them?
Organizations should review their OS security policies and procedures quarterly or annually. When there are any minor or major changes in the organization’s assets, infrastructure or networks, all policies and procedures should be updated.
Which policy includes both the incident response policy and the disaster recovery plan?
Business Continuity Plan
Which policy informs users on how to handle an organization’s confidential or sensitive information?
The main objective of the information security policy is to inform users that there are guidelines that they will be held accountable for while handling sensitive data for the organization. These policies can be broken down into areas such as how employees uses IT assets, how they use the network, and rules about internet usage.
Which statement below is not a subject that would be included in an Access Control Policy (ACP)?
Installing a firewall
If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
Data loss prevention (DLP) uses pattern recognition to prevent sensitive data from leaving the corporate network.
If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?
Scanning emails for viruses
Which of the following are NOT a method to deliver network security?
Over the telephone
When can a network security hardware appliance stop threats on the network?
When it is installed in line.