Module 6 Flashcards

1
Q

T/F
Operating System plays a key role in computer system security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F
Any vulnerability at the operating system level opens the entire system to attack

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F
The more complex and powerful the operating system, the more likely it is to have no vulnerabilities to attack

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ must be on guard to arm their operating systems with all available defenses against attack

A

System administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Capability of a system to do its mission in the presence of attacks, failures, or accidents

A

System Survivability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What key property is:
Strategies for repelling attacks

A

Resistance to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key property is:
Strategies for detecting attacks and evaluating damage

A

Recognition of attacks and damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What key property is:
Strategies for limiting damage, restoring information or functionality, maintaining or restoring essential services

A

Recovery of essential and full services after attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What key property is:
Strategies improving system survivability based on knowledge from prior intrusions

A

Adaptation and evolution to reduce effectiveness of future attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities of Single computer (without e-mail or Internet)

A

Passwords, viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerabilities of LAN connected (without Internet)

A

Sniffers, spoofing (+passwords, viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilities of LAN connected (with Internet)

A

E-mail, Web servers, FTP, Telnet (+sniffers, spoofing, passwords, viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F
Backup and recovery are essential for most computing systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Many system managers use a ____.

A

Layered Backup Schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F
Backups stored on-site are crucial to disaster recovery

A

False (Off-site dapat para efas)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Written security procedures should recommend:

A

(FRGCNGR):
oFrequent password changes
oReliable backup procedures
oGuidelines for loading new software
oCompliance with software licenses
oNetwork safeguards
oGuidelines for monitoring network activity
oRules for terminal access

17
Q

T/F
A gap in system security can be malicious or not

18
Q

Intrusions can be classified as:

A

oDue to uneducated users and unauthorized access
oPurposeful disruption of the system’s operation
oPurely accidental

19
Q

T/F
A breach of security severely does not damage the system’s credibility

20
Q

Any breach of security or modification of data that was not the result of a planned intrusion

A

Unintentional Intrusions

21
Q

A hacker taking over computers flood a target site with demands for data and tasks causing a computer to perform repeated unproductive task.

A

Denial of service (DoS)

22
Q

Unauthorized users gain access to search through secondary storage for information they don’t have the privilege to read.

23
Q

Unauthorized users monitor or modify a user’s transmission

A

Wire Tapping

24
Q

Entering systems by guessing authentic passwords

A

Repeated Trials

25
Unspecified and undocumented entry point
Trap Doors
26
Use of discarded materials to enter the system illegally.
Trash Collection
27
Small programs written to alter how a computer operates without permission of the user
Viruses and Worm
28
____ must be self-executing and self-replicating
Viruses
29
Infects files on the computer, normally executable files
File infector virus
30
Viruses that reside in memory and infect any clean executable program that runs on that computer.
File infector virus
31
Infects the boot record, the system area of a floppy disk or hard drive.
Boot sector virus
32
These viruses activate whenever the user boots up the computer.
Boot sector virus
33
Infects the boot record of a disk, saving a legitimate copy in a different location on the volume.
Master Boot Record Virus
34
Infects both the boot record and program files, making them difficult to repair.
Multipartite virus
35
Virus that must be removed all at once or a single instance of the virus will infect the system again.
Multipartite virus
36
Infects data files, newer versions infect other program files.
Macro virus
37
With this virus, users should disable automatic execution of macros on files they don't trust.
Macro virus