Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Review Questions for
Chapter 2
Operating System Security Fundamentals

  1. The graphical user interface program found on the desktop of most machines is called an operating system. True or false?
  2. Authorization is a process that validates the identity of the user in order to permit access to the operating system. True or false?
  3. Digital authentication is a digital passport that identifies and verifies the holder of the certificated. True or false?
  4. FTP clients and server encrypt all transmitted data. True of false?
  5. It is acceptable to use peer-to-peer programs to download files as long as these files are public domain and your system is protected by an antivirus program. True or false?
  6. LDAP can be used to store information not related to authentication. True or false?
  7. Which of the following is not a valid authentication method?
    • Lightweight Directory Access Protocol
    • NLM
    • Kerberos
    • RADIUS

8. Which of the following is a malicious code?

    • Bug
    • Patch
    • Service pack
    • Time bomb

9. Which of the following is not true about operating system security environment?

    • An operating system is a collection of programs that allows the user to operate the computer hardware.
    • The operating system components of the database environment can be used as a gateway to violated database integrity.
    • The components that make up the operating system security environment are used as access points to the database and can be weak or insecure links to connect to data within the database.
    • Files, service, and memory are the three components of the operating system security environment.

10. Why is it important to protect the operating system?

11. Name three methods of protecting operating system.

12. What is the difference between authentication and authorization? Provide an example.

13. Name two best practices for user administration, and provide an example of how each practice enhances operating system security.

14. Name three source of detailed information about viruses.

15. What should we do if developer needs one of the files that own?