Windows mod 5 Flashcards

(99 cards)

1
Q

Controls nearly all functions of computer. Computers rely on this to provide a means for interaction among users, software, and hardware.

A

Operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The person using a computer/device. User interaction with software and hardware is provided through OS interfaces.

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executable code deigned to carry out specific tasks on the computer, also referred to as programs or software.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As OS consists of two parts:

OS Interface

OS Kernel

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows a user to interface with applications, system, and hardware.

A

OS Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The heart of an OS. Manages the interaction between a user, applications, and hardware.

A

OS Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The mechanical, magnetic, electronic, and electrical components of a computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An OS Interface with data on a hard drive through a file system.

  • file system
  • directory
  • file
A

File System Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defines the way data is named, stored, organized, and accessed.

A

File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a container used to organize files and data for use by an OS.

A

Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a singular named resource used to store information/data.

A

File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the OSs responsibility to allocate and protect resources for all processes on the system.

A

Process Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is an executing instance of an application.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The communications path between an OS and attached devices is made possible through special programs called device drivers.

A

Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is any hardware component or peripheral attached to a computer.

A

Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a computer program that operates or controls a device attached to a computer.

A

Device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is used as an interpreter

A

Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Only one user can perform a task at any given time.

A

Single user, single tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Only one user can perform multiple tasks (programs) at a time. (Not all mobile devices allow this.)

A

Single user, multi-tasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One or more users can perform one or more tasks at one time.

A

Multiuser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Operates in a networked environment allowing a user to connect to another computer (server) to retrieve information.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Provides various services, including email, file sharing, and printer access, as well as ensuring security, to other computers (clients) across a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Two or more servers are grouped together, appearing as one system, providing a failover system with load balancing.

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One or more tasks are spread among two or more computers.

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
If a node in the cluster fails, the services on that node are picked up by other service nodes.
Failover
26
Every OS has inherent vulnerabilities posing risks that must be acknowledged and managed
Information Assurance
27
Assurance that information is not disclosed to unauthorized individuals, processes, or devices. This is more comparable to “need to know” than a security level.
Confidentiality
28
Assurance that no unauthorized modification or destruction of information occurred in transit.
Integrity
29
Assurance of reliable access to data and services for authorized users.
Availability
30
Assurance that data delivery is proven to is proven to be from a reliable source.
Non-repudiation
31
Assurance of properly verifying a user’s credentials
Authentication
32
non-privileged user accounts are only granted access to what is authorized.
principle of least privilege
33
the privileged account in Windows
Administrator
34
Permissions are implemented by an Access Control List (ACL).
Discretionary Access Control (DAC)
35
details account permissions to a specific resource as determined by permissions set by the owner of that resource.
Access Control List (ACL)
36
policies are set by an administrator using a policy tool. OSs enforce system security policy using security labels (e.g., need-to-know).
Mandatory Access Control (MAC)
37
Access decisions are based on each account’s role or functional position.
Role-Based Access Control (RBAC)
38
is a record of system or user activities.
log file
39
occurs when computer data is copied or archived, usually to a separate location, and for the purpose of data recovery should data loss occur.
backup
40
is a sequence of events that begins when a system is powered on and ends once the OS kernel is loaded into memory space and begins executing.
boot process
41
is a set of instructions embedded onto a ROM, PROM, or EEPROM that tells the device how to communicate with other hardware and software.
Firmware
42
which creates cylinders, tracks, and sectors (commonly 512bytes in size) on the platters
low-level format
43
groups consecutive sectors together and prepare a hard drive for storing a file system.
Partitioning
44
groups sectors into addressable clusters used by a file system for storing and retrieving disk data.
high-level format
45
provides the initial interface between major hardware components and the OS with a primary goal of finding and loading the OS.
Basic Input/Output System (BIOS)
46
provides detailed information about the computer hardware and can be altered as the configuration changes by entering the BIOS setup.
CMOS
47
occurs when a computer is initially powered on. The BIOS executes a POST (Power-On Self-Test)to initialize and test hardware components. The POST uses beep codes and/or light indicators for error notification.
cold boot
48
(soft boot) occurs when an OS is restarted without an interruption of power. A POST is not performed during a warm boot.
warm boot
49
initialize and test hardware components. This uses beep codes and/or light indicators for error notification.
POST
50
contains a partition table identifying the location of all created partitions. Creation of additional partitions updates the existing partition table. it resides at the first physical sector of the drive (sector 0) and is not part of any partition. It is the first sector read from the boot device and it contains the information to continue the boot process. it is 512 bytes.
MBR *max supported partition size is 2TB
51
contains the hex value AA55 or 55AA, which classifies the MBR as valid.
magic number
52
This is 64 byes and is located at byte offsets 446 through 509 (0x1BE to 0x1FD). It has space for four entries (16 bytes each) to describe each of the partitions.
partition table
53
full access to physical memory is available.
real mode
54
Access to memory is controlled.
protected mode
55
one of the most dangerous types of malware attacks due to the ability to infect the MBR.
bootkit
56
Is an improved method of booting due to its highly secure way of carrying out the boot process, checking the integrity of drivers and OS boot loaders that use verification and initialization of digitally signed code.
UEFI
57
Uses Logical Block Addressing (LBA) in place of the Cylinder-Head-Sector (CHS) addressing used with MBR. This allows for 128 possible partitions with partition sizes of up to approximately 9.4ZBs (zettabytes).
The Globally Unique Identifier (GUID) Partition Table (GPT)
58
defines the usable blocks on a disk and the number and size of partition entries that make up the partition table.
GPT Header
59
Firmware is initialized.
Security (SEC)
60
Low-level hardware is initialized.
Pre-EFI Initialization (PEI)
61
UEFI drivers are loaded and executed.
Driver Execution Environment (DXE)
62
A GPT or MBR determination is made based on boot configuration.
Boot Device Selection (BDS)
63
Depending on the boot device selected, the firmware boots an OS loader, UEFI Shell, or UEFI application.
Transient System Load (TSL)
64
UEFI program is cleared from memory and released to the OS.
Run Time (RT)
65
Accounts automatically created when an OS is installed. At a minimum, every Windows system has an Administrator and Guest built-in account.
Built-In
66
User account with the highest level of privileges and permissions. Users authenticated as Administrator can install software/devices, change system configuration settings, and manage other user accounts. This account cannot be deleted.
Administrator | Built-in
67
Intended for temporary access when an individual user account does not exist.Guest account abilities are greatly limited, but a password is typically not required to access the system.
Guest | Built-in
68
Account authenticated by the local machine. Local account credentials are maintained in a local database called the Security Accounts Manager (SAM).
Local
69
Local account credentials are maintained in a local database
Security Accounts Manager (SAM)
70
Account authenticated by a domain controller. A domain controller is a centralized server in a Windows network that stores domain account credentials in a database called Active Directory.
Domain
71
A centralized server in a Windows network that stores domain account credentials
domain controller
72
stores domain account credentials
Active Directory
73
Each Windows system is considered standalone with regards to authentication.
workgroup
74
When a user logs on to a system for the first time and/or does not have a profile, the settings contained in this directory are used to create the user’s profile.(C:\Documents and Settings\Default User prior to Windows 7)
Default
75
The settings contained in are used to add settings and programs to existing accounts that affect all users that log on to the system.(C:\Documents and Settings\All Users prior to Windows 7)
Public
76
contains folders and files of installed software, like Microsoft Office, Adobe Acrobat, Symantec Antivirus, or other optional third party and non-OS software.
Program Files
77
Contains folders and files of the specific Windows OS and is referred to as “system root”.
Windows folder
78
is used to identify the Windows directory name value for where the OS is installed.
%SystemRoot%
79
contains most of the built-in Windows system files, programs, and commands.
System32 Folder
80
contains a subdirectory for each user who has logged on to the system.
Users Folder
81
are on/off type features.
attributes
82
may have varying values, (e.g., name, size, times, dates)
properties
83
Allows backup programs to know which files to backup.
Archive A
84
Protects the file from being over-written or modified.
Read-only R
85
Compressed file or directory (NTFS only)
Compression C
86
Hidden from standard directory listings and common users
Hidden H
87
Encrypted file or directory (NTFS only)
Encryption E
88
System file, generally protected from common user access.
System S
89
is a mechanism by which a system determines the level of access an authenticated user has to system resources (e.g., files and directories).
Authorization
90
to assign file and directory permissions.
Discretionary Access Control Lists(DACL)
91
is the most common file system offered by Microsoft.
New Technology File System | NTFS
92
Meaning for Folders Permits viewing and listing of files and subfolders Meaning for Files Permits viewing file contents
Read
93
Meaning for Folders Permits adding of files and subfolders Meaning for Files Permits writing to a file
Write
94
Meaning for Folders Permits viewing and listing of files and subfolders as well as file execution; inherited by files and folders Meaning for Files Permits viewing file contents and file execution
Read and Execute
95
Meaning for Folders Permits viewing a listing of files and subfolders; inherited by folders only Meaning for Files N/A
List Folder Contents
96
Meaning for Folders Permits reading and writing of files and subfolders; allows deletion of the folder Meaning for Files Permits reading and writing of the file; allows deletion of the file
Modify
97
Meaning for Folders Permits reading, writing, changing of permissions, and deleting of files and subfolders Meaning for Files Permits reading, writing, changing of permissions, and deleting of the file
Full Control
98
This group cannot be manually updated because all accounts are considered members.
Everyone
99
they only apply when the shared folder is accessed over the network.
Share permissions