1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The three operating system security layers are
physical hardware, operating system kernel, and user applications and utilities
The aim of the specific system installation planning process is to
maximize security while minimizing costs
System security begins with
installation of the operating system
The final step in the process of initially securing the base operating system is
security testing
is a reactive control that can only inform you about bad things that have already happened
Logging
Is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks
Backup
Is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data
archive
_________ systems should validate all patches on test systems before deploying them to production systems
change controlled
Unix and Linux systems grant access permissions for each resource using the __________ ommand
chmod
Unix and Linux systems use a __________________ which restricts the server's view of the file system to just a specified portion
chroot jail
Configuration information in Windows systems is centralized in the __________, which forms a database of keys and values
registry
________________________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment
virtualization
Guest OSs are managed by a _____________________ or ______________, that coordinates access between each of the guests and the actual physical hardware resources
hypervisor or VMM
______________________________________ systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types
Hosted virtualization
______________________________________ systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware
Native virtualization