Mod 5 Flashcards

(47 cards)

1
Q

This controls nearly all functions of a computer provides a means for interaction among users software and Hardware

A

Operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allows the user to interface with applications system software and Hardware

A

OS interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The heart of the OS manages the interaction between each layer

A

OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three core functions of the OS

A

File system management
Process Management
device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This defines the way data is named stored organized and accessed on a hard drive it can be compared to a filing cabinet for each drawer correlates to a disk volume each folder correlates to a directory in the papers within the folders correlate to files or data on the system

A

A file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A singular named resource that is used for storing information or data

A

A file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is an executing instance of an application

A

A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any hardware component or peripheral attached to the computer

A

A device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The communications path between the OS and these devices is made possible through special programs called what

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Only one user can perform a task at any given time

A

Single-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Only one user can perform multiple tasks at a time

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One or more tasks are spread among two or more computers

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operates in a network environment allowing user to connect to another computer or server to retrieve information

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provides various services including email file sharing and printer access as well as ensuring security to other computers or clients across the network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed by what

A

Information assurance IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the five information assurance risk management techniques

A
Confidentiality 
integrity 
availability 
non-repudiation 
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Assurance that information is not disclosed to unauthorized individuals processes or devices

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assurance that no unauthorized modification or destruction of information occurred

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assurance of reliable access to data in services for authorized users

20
Q

Assurance that data delivery is proven to be from a reliable source

A

Non-repudiation

21
Q

Assurance of properly verifying a user’s credentials

A

Authentication

22
Q

The privilege account on Linux systems is

23
Q

Privileged account on Windows system is

A

Administrator

24
Q

What are the three types of Access Control

A

Discretionary Access Control DAC
mandatory Access Control Mac
role-based Access Control rbac

25
Commonly referred to as permissions and is implemented using access control lists ACLs
Discretionary Access Control
26
OS enforces the system security policy using security labels
Mandatory Access Control Mac
27
Access decisions are based on each accounts roll or functional position.......... is used for processes not files
Role-based Access Control rbac
28
This helps ensure the confidentiality and integrity aspects of IA or attainable
Logging
29
This is a record of system or user activities and can contain events generated either locally or from a remote system
Log file
30
This is when computer data is copied or archived usually to a separate location in for the purpose of data recovery should data loss occur
Backup
31
What are the three main types of user accounts that Windows uses
Built-in local domain
32
Account authenticated by the local machine, credentials are maintained in a local database called the security accounts manager Sam
Local
33
Account authenticated by domain controller
Domain
34
This is a centralized server in a Windows Network that stores domain account credentials in a database called active directory
Domain controller
35
In this model each Windows system is considered stand alone with regards to Authentication
The workgroup
36
This model A collection of computers sharing common configurations resources and security principles
Domain model
37
These contain profiles which are a collection of folders containing user personal data and preferences
Subdirectories
38
Windows 7 replaces the documents and settings with what to store profiles
User's directory
39
This contains all OS files
System root folder
40
What contains most of the built-in Windows system files programs and commands
System 32
41
Any characteristic of a file or directory, on / off type features
Attribute
42
These may have varying values either the name size times dates Etc
Properties
43
Mechanism by which a system securely identifies a user
Authentication
44
Mechanism by which a system determines the level of access an authenticated user has two system resources, files and directories
Authorization
45
Windows OS utilize the __________ _____ ________, which provides the capability of a signing file and directory permissions using _______________ _________ _______ ______.
New Technology file system (NTFS) | DISCRETIONARY ACCESS CONTROL LIST (DACL)
46
This is implemented on directories not files
Sharing
47
When access locally ______ ___________ are ignored
Share permissions