Anda di halaman 1dari 1

CHAPTER 3

I.

IDENTIFICATION
1.

At login, the operating system creates an __________ that contains key information
about the user, including user ID, password, user group, and privileges granted to the
user.
2. An audit log that summarizes key activities related to users, applications, and system
resources.
3. Is the computer equivalent of a telephone wiretap. It is a log that records both the
users keystrokes and the systems responses to them.
4. A system that enforces access control between two networks.
5. A list that is assigned to each computer resource such as directories, files, programs,
and printers. These lists contain information that defines the access privileges for all
valid users of the resource.
6. A technique that searches individual network packets for protocol non-compliance to
decide if a packet can proceed to its destination.
7. An independent and trusted third party empowered with responsibility to vouch for the
identity of organizations and individuals engaging in Internet commerce.
8. Used to verify the senders identity. It is issued by a trusted third party called a
certification authority (CA).
9. Rules and standards governing the design of hardware and software that permit
users of networks manufactured by different vendors to communicate and share
data.
10. Messages are divided into small packets for transmission. Individual packets of the
same message may take different routes to their destinations
11. A private network that exists within a public network.
12. Ensures that the total number of bytes transmitted is equal to the total number of
bytes received.

II. ENUMERATION
13-17 FIVE CONTROL OBJECTIVES OF AN OPERATING SYSTEM
18-20 THREE TYPES OF ADDRESSES USED ON THE INTERNET

Anda mungkin juga menyukai