• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
1. The three operating system security layers are: physical hardware, operating system kernel, and _________.
user applications and utilities
2. The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
security
3. System security begins with the installation of the ________.
operating system
4. The final step in the process of initially securing the base operating system is ________.
Security testing
5. ______ is a reactive control that can only inform you about bad things that have already happened.
Logging
6. _______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
Backup
7. ______ is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data.
Archive
8. _______ systems should validate all patches on test systems before deploying them to production systems.
Change controlled
9. Unix and Linux systems grant access permissions for each resource using the ______ command.
chmod
10. Unix and Linux systems use a ________ which restricts the server’s view of the file system to just a specified portion.
chroot jail
11. Configuration information in Windows systems is centralized in the _______, which forms a database of keys and values.
Registry
12. ________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
Virtualization
13. Guest OSs are managed by a ______, or VMM, that coordinates access between each of the guests and the actual physical hardware resources.
hypervisor
14. ______ virtualization systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types.
Hosted
15. ______ virtualization systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware.
Native