CORRECT ANSWERS
The information is stored and is not currently being processed. We also call this state
"data at rest" - Answer- Storage state
The information is being used by an active process to make decisions or to transform
the information into another form. This is "data in use" - Answer- Processing state
The information is being moved from one storage area to another. This is "data in
motion" - Answer- Transmission state
We often use the term ____ ____ when talking about a particular collection of security
requirements. - Answer- Security Policy
Different Strategies for sharing or protecting files often yield two general types of
policies: - Answer- Global policies and Tailored Policies
A ___ ___ establishes file permissions to apply by default and those to apply when we
create a new file. - Answer- Global Policy
A Global Policy that grants no access to other users' files is called? - Answer- isolation
policy
A Global Policy that grants read access to other users' files is called? - Answer- File-
sharing Policy
Is a piece of binary data that modifies the instructions in a program to correct a problem.
- Answer- a Patch
The software remains vulnerable while an exploit exists and the software remains
unpatched. We call this the? - Answer- Window of vulnerability.
The period of time during which a system is unprotected from an exploit - Answer-
Window of vulnerability
All modern systems use a _______ ________ to organize files into groups. - Answer-
Hierarchical directory.
, The directory forms an inverted tree growing from the topmost directory, called? -
Answer- root directory
On Microsoft Windows, each drive has its own directory, starting at its own ________. -
Answer- root
An operating system provides four access rights for files and most other resources.
What are they? - Answer- Create
Read
Update
Delete
Create, Read, Update, Delete for the acronym ________. - Answer- CRUD
Systems tend to implement either two mechanisms to apply initial access rights: -
Answer- Default rights
Inherited rights
Operating systems grant or deny rights in terms of? - Answer- Containers
The basic access rights to a directory are _____ and ______. - Answer- read and write
It allows the user's process to search a directory for a particular name in a file's path,
but not to examine the directory as a whole. This permission allows other users to
retrieve a file from the directory even if they don't have the right to read the entire
directory. - Answer- seek right
When we look in our directories at the files, we distinguish between two file types: -
Answer- Data files
Executable files
like a word-processing file containing an essay, a spreadsheet, or a configuration file
used by a program or the operating system. - Answer- Data files
contain application programs or other programs - Answer- Executable files
An ________ file contains instructions to be executed by the CPU. - Answer-
Executable
Every executable file begins with a "_____ _______" that describes the structure and
format of the program. - Answer- file header
File headers contains these 3 fields. - Answer- Magic number