CHAPTER SUMMARY

In this chapter, you read about how access controls are implemented in various operating systems and how those security features are used to solve real-world challenges. The goal of any access control system in a server or network environment is to decide whether any given user can access data and what they can do with it. To achieve this goal, operating systems implement a system of granular user rights. Users are bundled into groups to simplify rights management.

KEY CONCEPTS AND TERMS

CHAPTER 8 ASSESSMENT

  1. A(n) _____ is a mechanism used to control the output of a specific industrial process.
  2. In a Linux file system, what value corresponds to read, write, and execute access?
    1. 9
    2. 7
    3. 5
    4. 3
  3. A(n) _____ is a list or collection of access control entities.
  4. The three primary ACEs are access-denied, access-allowed, and _____.
  5. _____ in a database are an example of an application with internal access controls.
  6. Compared with Windows, the Linux operating system implements more granular access controls.
    1. True
    2. False
  7. In a Windows environment, what is an organizational unit?
    1. A logical structure for organizing users, groups, and computers
    2. A business unit
    3. A group of related data
    4. A logical structure for organizing firewall rules
  8. A Windows domain administrator has full control over all the computers in the domain.
    1. True
    2. False
  9. A Windows domain administrator is the top-level authority in a Windows environment.
    1. True
    2. False
  10. In which operating systems is rwxr – xr – x an example of rights notation? _____
  11. What does the sudo command in Linux allow systems administrators to do?
    1. Log in as root.
    2. Run any process as if they were logged in as another user.
    3. Disable the root user.
    4. Disable a user account.
  12. Why should an organization automate user creation? (Select two.)
    1. To save time and effort for the IT staff
    2. To allow individuals to manage their own user accounts
    3. To accurately add, modify, or remove access rights
    4. To minimize the need for a full IT staff
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.105.239