Chapter 15 Exam Prep Operating System Security - Operating Systems Internals 9th Global Edition | Test Bank with Key by Stallings by William Stallings. DOCX document preview.

Chapter 15 Exam Prep Operating System Security

Chapter 15 – Operating System Security

TRUE/FALSE QUESTIONS:

T F 1) An OS associates a set of privileges with each process.

T F 2) The misfeasor is generally an outsider.

T F 3) The objective of the intruder is to gain access to a system or to increase

the range of privileges accessible on a system.

T F 4) Worms and bot programs are self-contained programs that can be

scheduled and run by the operating system.

T F 5) Intrusion detection systems are only designed to detect malicious

software behavior.

T F 6) The owner of the object can generally perform any action on the

security descriptor.

T F 7) The Security ID identifies a user uniquely across all of the machines

on the network.

T F 8) Manual analysis of logs is preferred, as it is more likely to identify

abnormal activity.

T F 9) The needs and policy relating to backup and archive should be determined

during the final stages of implementation.

T F 10) Firewalls are traditionally configured to limit access by port or protocol,

from some or all external systems.

T F 11) All users with access to a system will have the same access to all data

and resources on that system.

T F 12) Host-based firewalls, IDS, and IPS software also may improve security

by limiting remote network access to services on the system.

T F 13) You should stage and validate all patches on test systems before deploying

them in production.

T F 14) The superuser is exempt from the usual file access control constraints

and has systemwide access.

T F 15) DAC is based on the roles that users assume in a system rather than

the user’s identity.

MULTIPLE CHOICE QUESTIONS:

  1. 
On a typical system the highest level or privilege is referred to as _________ .

A) administrator B) supervisor

C) root access D) all of the above

2) A _________ is an individual who is not authorized to use the computer and who

penetrates a system’s access controls to exploit a legitimate user’s account.

A) clandestine user B) superuser

C) masquerader D) misfeasor

3) A __________ is an individual who seizes supervisory control of the system and

uses this control to evade auditing and access controls or to suppress audit collection.

A) misfeasor B) clandestine user

C) superuser D) masquerader

4) A _________ is a legitimate user who accesses data, programs, or resources for which

such access is not authorized, or who is authorized for such access but misuses his or

her privileges.

A) superuser B) misfeasor

C) masquerader D) clandestine user

5) The ________ determines which users and groups can access this object for which operations.

A) DACL B) SACL

C) RPC D) ACE

6) ________ define the type and contents of a security descriptor.

A) SACLs B) Flags

C) Owners D) DACLs

7) ________ is the identifier by which this user is known to the system for purposes of security.

A) ACE B) Access token

C) SID D) Password scheme

8) Effective _________ helps ensure that in the event of a system breach or failure, system

administrators can more quickly and accurately identify what happened and thus most

effectively focus their remediation and recovery efforts.

A) logging B) archiving

C) security D) patching

9) ________ is the traditional method of implementing access control.

A) MAC B) RAC

C) DAC D) RBAC

10) ________ controls access based on comparing security labels with security clearances.

A) RBAC B) MAC

C) DAC D) RAC

11) _________ defenses aim to harden programs to resist attacks.

A) Coding B) Compile-time

C) Runtime D) Programming

12) A __________ is a dedicated computer that interfaces with computers outside a network

and has special security precautions built into it in order to protect sensitive files on

computers within the network.

A) firewall B) ACL

C) matrix D) guard

13) _________ implements a security policy that specifies who or what may have access

to each specific system resource and the type of access that is permitted in each instance.

A) Guard page B) Access control

C) Firewall D) All of the above

14) Recognition by voice pattern, handwriting characteristics, and typing rhythm

are examples of ________ .

A) cyclical biometrics B) recognition biometrics

C) dynamic biometrics D) static biometrics

15) Recognition by fingerprint, retina, and face are examples of ___________ .

A) static biometrics B) dynamic biometrics

C) recognition biometrics D) cyclical biometrics

SHORT ANSWER QUESTIONS:

  1. With ________ a process has complete control of the system and can add or change programs and files, monitor other processes, send and receive network traffic, and alter privileges.
  2. A key security issue in the design of any _________ is to prevent, or at least detect, attempts by a user or a piece of malicious software from gaining unauthorized privileges on the system.
  3. System access threats fall into two general categories: intruders and ________ .
  4. The three classes of intruders are: clandestine user, misfeasor, and ________ .
  5. Intrusion detection systems can be classified as host-based or ___________ .
  6. _______ is the process of retaining copies of data over extended periods of time in order to meet legal and operational requirements to access past data.
  7. _______ is the process of making copies of data at regular intervals, allowing the recovery of lost or corrupted data over relatively short time periods.
  8. System security begins with the installation of the _________ .
  9. _________ controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
  10. _________ controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.
  11. ________ defenses aim to detect and abort attacks in executing programs.
  12. __________ is a condition at an interface under which more input can be placed into a buffer or data-holding area than the capacity allocated, overwriting other information.
  13. The design goals for a ________ are: acts as a choke point, enforces the local security policy, is secure against attacks.
  14. Electronic keycards, smart cards, and physical keys are authenticators that are referred to as a __________ .
  15. An IDS comprises three logical components: sensors, user interface, and ________ .

Document Information

Document Type:
DOCX
Chapter Number:
15
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 15 – Operating System Security
Author:
William Stallings

Connected Book

Operating Systems Internals 9th Global Edition | Test Bank with Key by Stallings

By William Stallings

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party