Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
1. The three operating system security layers are: physical hardware, operating system kernel, and _________.
|
user applications and utilities
|
|
2. The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
|
security
|
|
3. System security begins with the installation of the ________.
|
operating system
|
|
4. The final step in the process of initially securing the base operating system is ________.
|
Security testing
|
|
5. ______ is a reactive control that can only inform you about bad things that have already happened.
|
Logging
|
|
6. _______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
|
Backup
|
|
7. ______ is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data.
|
Archive
|
|
8. _______ systems should validate all patches on test systems before deploying them to production systems.
|
Change controlled
|
|
9. Unix and Linux systems grant access permissions for each resource using the ______ command.
|
chmod
|
|
10. Unix and Linux systems use a ________ which restricts the server’s view of the file system to just a specified portion.
|
chroot jail
|
|
11. Configuration information in Windows systems is centralized in the _______, which forms a database of keys and values.
|
Registry
|
|
12. ________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
|
Virtualization
|
|
13. Guest OSs are managed by a ______, or VMM, that coordinates access between each of the guests and the actual physical hardware resources.
|
hypervisor
|
|
14. ______ virtualization systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types.
|
Hosted
|
|
15. ______ virtualization systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware.
|
Native
|