Module 3: Windows Operating System Security Basics

Spread the love

INTRODUCTION – Windows Operating System Security Basics

As far as this module is concerned, you will be introduced to the file system and directory structures that are specific to the Windows operating system. You will also get used to different shortcut keys and commands that are designed to help you navigate through the entire Windows environment more efficiently, find information easily, and reduce the overall work you are doing.

Learning Objectives:

  • Illustrate keyboard shortcuts, which are useful in Windows.
  • Summarize the ways in which Windows distinguishes 32-bit applications from 64-bit applications.
  • Explain what is meant by a Windows directory structure.
  • Contrast the NTFS file system with the FAT file system as used by Windows.
  • Define what a file system is, along with its hierarchical structure in for Windows.
  • Contrast between the two modes of operation in Windows, that is, user and kernel mode.

USER AND KERNEL MODES

1. How many unique address spaces are used by applications running in kernel mode?

  • 0
  • (CORRECT)
  • 4
  • As many as there are processes running

Correct! All applications do not run under a single shared address space in Kernel mode. The operating system kernel possesses the complete access to the system’s hardware as well as memory, while applications, running in user mode, have limited access to the resources on the system. Therefore, installing an application in kernel mode allows the OS to manage all resources and perform an important operation; however, through user mode, the application gets isolated from accessing the hardware directly or performing system-level operations.

FILE SYSTEMS AND DIRECTORY STRUCTURE

1. Which two (2) of these file systems could you use to format a 64 GB USB drive?

  • FAT16
  • NTFS (CORRECT)
  • FAT32 (CORRECT)

Partially correct. NTFS will work.

Partially correct! FAT32 will work.

2. Where does Windows 10 store 64-bit applications?

  • \System32
  • \System
  • \Program Files (x86)
  • \Program Files (CORRECT)

Correct! The app files can be found stored in the above location in Windows 10.

SHORTCUTS AND COMMANDS

1. Which shortcut will close all applications?

  • Alt+F4 (CORRECT)
  • Ctrl+Z
  • Ctrl+X
  • Alt+Tab

Correct! This will shut down all applications and notify the user whether any unsaved work is present.

2. Which of the following are examples of data visualizations? Select all that apply.

  • Reports
  • Charts (Correct)
  • Graphs (Correct)
  • Maps (Correct)

Correct: Data visualization utilizes tools like graphs, maps, and charts.

2. What is the shortcut for saving a screenshot?

  • Win+PrtScn (CORRECT)
  • Ctrl+Alt+P
  • Ctrl+Alt+PrtScn
  • Win+P

Correct! This is how to save a screenshot.

WINDOWS OPERATING SYSTEM SECURITY BASICS

1. What Windows mode do users interact with directly?

  • Kernel mode
  • User mode (CORRECT)
  • Desktop mode
  • Shell mode

2. What does Windows create every time an applications is started in user mode?

  • A process. (CORRECT)
  • A task.
  • A kernel.
  • A shell.

3. If you are setting up a new Windows laptop with a 128Gb hard drive and you want only a single file partition on the drive, which file systems can choose from?

  • NTFS or FAT32
  • NTFS, FAT32 or FAT16
  • NTFS (CORRECT)
  • FAT32 or FAT16

4. A file name in Windows must be unique where?

  • Within the same partition.
  • Within the same storage device (hard drive or SSD).
  • Within the same directory. (CORRECT)
  • There is no uniqueness requirement for file names in Windows.

5. Windows 10 can be purchased for which versions?

  • 64 bit only.
  • 32 bit or 64 bit. (CORRECT)
  • 16 bit, 32 bit or 64 bit.
  • 32 bit only.

6. If you want to roll back or undo an action, what shortcut should you use?

  • Ctrl-W
  • Ctrl-Z (CORRECT)
  • Ctrl-V
  • Ctrl-C

7. Which shortcut will switch between running applications?

  • Win-S
  • Win-Tab
  • Ctrl-S
  • Alt-Tab (CORRECT)

8. Where does Windows 10 store 32-bit applications?

  • \System
  • \System32
  •  \Program Files
  • \Program Files (x86) (CORRECT)

9. What is the shortcut to open the Task Manager?

  • Ctrl+Shift+T
  • Ctrl+T
  • Ctrl+Alt+Del
  • Ctrl+Shift+Esc (CORRECT)

KEY COMPONENTS

1. Which three (3) statements about Linux are True?

  • Linux is licensed under the General Public License (GNU). (CORRECT)
  • Linux was developed and is now owned by Red Hat.
  • Linux is an open source operating system. (CORRECT)
  • Linux guarantees end users freedom to run, study, share, and modify the software. (CORRECT)

Partially correct! This is the how Linux is licensed.

Partially correct! You can download and customize Linux according to your preferences in any fashion that suits you.

Partially correct! Linux accords you a great deal of liberty to use and adjust according to your requirements.

FILE SYSTEMS

1. Executable files such as ping, grep and cp are stored in which directory?

  • /sbin
  • /root
  • /bin (CORRECT)
  • /etc

Correct! This is where most binary files are kept.

LINUX BASIC COMMANDS

1. The Linux “kill” command does which of the following?

  • Permanently delete a file.
  • Performs an emergency system down.
  • Permanently delete a system directory.
  • Stop an executing process. (CORRECT)

Correct! The kill command halts execution for the then running process.

2. What permissions can be set on a file in Linux?

  • read, edit, run
  • read, write, execute (CORRECT)
  • read, edit, delete
  • view, modify, remove

Correct! These are the 3 permission types in Linux.

3. Which basic Linux command deletes an empty directory?

  • mv
  • rmdir (CORRECT)
  • rm
  • less

4. Which is not a group that can own a file?

  • anybody (CORRECT)
  • everybody
  • group
  • user

5. Your organization uses a Linux-based network. The legal department has a user group called legal, and this group has access to all the directories that legal employees need. A new legal employee, John J. Smith, just started, and his username is jjsmith. Which command can you use to grant John access to the same directories as all other legal employees?

  • sudogroupadd -g legal jjsmith
  • sudousermod -a -G legal jjsmith (CORRECT)
  • sudogroupmod -g -n legal jjsmith
  • sudogetent group legal jjsmith

Correct. To add one user into a group, you will use a usermod command-a command made to make specified changes for an existing user. Here, the -a option appends a user into the group and does not remove the user from other groups. And -G specifies that there will follow a name of at least one group. After -G, you list the group into which you are going to add the user-in this case legal-and at the end, you add the username. In this case, it’s jjsmith.

LINUX OPERATING SYSTEM SECURITY BASICS

1. Which three (3) groups can “own” a file in Linux?

  • user, group, everybody (CORRECT)
  • user, team, world
  • system, user, group
  • self, other, all

2. What can be known about a file with permissions set to “-rwxr-x-r–“?

  • The file is a directory and the rwx indicators apply to all files within that directory.
  • The file is a directory, the user can read, write and execute the file; others can read and execute the file, and the group can execute it only.
  • The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. (CORRECT)
  • The user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. You cannot tell the file/directory type from this string.

3. A person using Linux would normally interact directly with which?

  • The HCL.
  • The API.
  • The shell. (CORRECT)
  • The kernel.

4. In the Linux file system, what is the highest level in the directory structure?

  • root (CORRECT)
  • bin
  • home
  • kernel

5. What does the nano command do?

  • nano is a file compression utility.
  • nano displays the first 10 lines of any text file.
  • nano is a basic text file editor. (CORRECT)
  • nano deletes all empty files and directories.

6. When configuring a new application, in which directory should you have it save log files?

  • /log
  • in the same directory where the application is located
  • /var (CORRECT)
  • /bin

7. The Linux “cat” command does which of the following?

  • Puts the file system catalog into edit mode for rapid deletion or insertion of files and directories.
  • Copies file properties.
  • Concatenates 2 or more files together. (CORRECT)
  • Creates a catalog of all files in the file system.

8. Your organization uses a Linux-based network, and you’re configuring Uncomplicated Firewall (ufw). You want to disable file transfers that use the File Transfer Protocol (FTP), which occurs on port 21. Which command can you use to block all traffic on this port?

  • sudoufw deny 21 (CORRECT)
  • sudoufw allow 21
  • sudoufw delete 21
  • sudoufw reload 21

MACOS RESOURCES KNOWLEDGE CHECK

1. What application can you use to see all the active running applications and processes on macOS?

  • Activity Monitor (CORRECT)
  • System information
  • Disk Utility
  • Console

2. What feature in macOS prevents unauthorized applications from being installed?

  • FileVault
  • Firewall
  • Gatekeeper (CORRECT)
  • Apple Watch

3. Which three (3) utilities are found when booting macOS to the recovery partition? (Select 3)

  • Safari (CORRECT)
  • Keychain Access
  • Disk Utility (CORRECT)
  • Time Machine (CORRECT)

Partially correct!

CONCLUSION – Windows Operating System Security Basics

This module has similarly given an adequate insight concerning the file system and directory structures in the operating system of Windows.

Having known shortcuts and commands, you are now able to efficiently run Windows and thereby improve productivity while reducing the retrieval processes of relevant information.

Leave a Comment