COURSE 2 – CYBERSECURITY ROLES, PROCESSES & OPERATING SYSTEM SECURITY

Module 3: Windows Operating System Security Basics

IBM CYBERSECURITY ANALYST PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Windows Operating System Security Basics

Within this module, you will acquire knowledge about the file system and directory structures specific to the Windows operating system. Additionally, you will familiarize yourself with numerous shortcuts and commands designed to streamline navigation within the Windows environment, facilitating efficient information retrieval and minimizing workload.

Learning Objectives

  • Describe various useful keyboard shortcuts applicable to Windows
  • Summarize how Windows handles the separation of 32-bit and 64-bit applications
  • Describe the Windows directory structure
  • Contrast the NTFS and FAT file systems that Windows uses
  • Define file system and hierarchical structure
  • Compare and contrast Windows’s two modes: user and kernel

USER AND KERNEL MODES

1. How many unique address spaces are used by applications running in kernel mode?

  • 0
  • 1 (CORRECT)
  • 4
  • As many as there are processes running

Correct! All applications run in the same shared address space in Kernel mode.

FILE SYSTEMS AND DIRECTORY STRUCTURE

1. Which two (2) of these file systems could you use to format a 64 GB USB drive?

  • FAT16
  • NTFS (CORRECT)
  • FAT32 (CORRECT)

Partially correct. NTFS will work.

Partially correct! FAT32 will work.

2. Where does Windows 10 store 64-bit applications?

  • \System32
  • \System
  • \Program Files (x86)
  • \Program Files (CORRECT)

Correct! in Windows 10, applications files are stored here.

SHORTCUTS AND COMMANDS

1. Which shortcut will close all applications?

  • Alt+F4 (CORRECT)
  • Ctrl+Z
  • Ctrl+X
  • Alt+Tab

Correct! This shortcut will close all applications, prompting you if there is unsaved work.

2. What is the shortcut for saving a screenshot?

  • Win+PrtScn (CORRECT)
  • Ctrl+Alt+P
  • Ctrl+Alt+PrtScn
  • Win+P

Correct! This is how to save a screenshot.

WINDOWS OPERATING SYSTEM SECURITY BASICS

1. What Windows mode do users interact with directly?

  • Kernel mode
  • User mode (CORRECT)
  • Desktop mode
  • Shell mode

2. What does Windows create every time an applications is started in user mode?

  • A process. (CORRECT)
  • A task.
  • A kernel.
  • A shell.

3. If you are setting up a new Windows laptop with a 128Gb hard drive and you want only a single file partition on the drive, which file systems can choose from?

  • NTFS or FAT32
  • NTFS, FAT32 or FAT16
  • NTFS (CORRECT)
  • FAT32 or FAT16

4. A file name in Windows must be unique where?

  • Within the same partition.
  • Within the same storage device (hard drive or SSD).
  • Within the same directory. (CORRECT)
  • There is no uniqueness requirement for file names in Windows.

5. Windows 10 can be purchased for which versions?

  • 64 bit only.
  • 32 bit or 64 bit. (CORRECT)
  • 16 bit, 32 bit or 64 bit.
  • 32 bit only.

6. If you want to roll back or undo an action, what shortcut should you use?

  • Ctrl-W
  • Ctrl-Z (CORRECT)
  • Ctrl-V
  • Ctrl-C

7. Which shortcut will switch between running applications?

  • Win-S
  • Win-Tab
  • Ctrl-S
  • Alt-Tab (CORRECT)

8. Where does Windows 10 store 32-bit applications?

  • \System
  • \System32
  •  \Program Files
  • \Program Files (x86) (CORRECT)

9. What is the shortcut to open the Task Manager?

  • Ctrl+Shift+T
  • Ctrl+T
  • Ctrl+Alt+Del
  • Ctrl+Shift+Esc (CORRECT)

KEY COMPONENTS

1. Which three (3) statements about Linux are True?

  • Linux is licensed under the General Public License (GNU). (CORRECT)
  • Linux was developed and is now owned by Red Hat.
  • Linux is an open source operating system. (CORRECT)
  • Linux guarantees end users freedom to run, study, share, and modify the software. (CORRECT)

Partially correct! This is the how Linux is licensed.

Partially correct! You can download and customize Linux in any way you like.

Partially correct! You have tremendous freedom to use and modify Linux to meet your needs.

FILE SYSTEMS

1. Executable files such as ping, grep and cp are stored in which directory?

  • /sbin
  • /root
  • /bin (CORRECT)
  • /etc

Correct! This is where most binary files are kept.

LINUX BASIC COMMANDS

1. The Linux “kill” command does which of the following?

  • Permanently delete a file.
  • Performs an emergency system down.
  • Permanently delete a system directory.
  • Stop an executing process. (CORRECT)

Correct! kill stops the current process from executing.

2. What permissions can be set on a file in Linux?

  • read, edit, run
  • read, write, execute (CORRECT)
  • read, edit, delete
  • view, modify, remove

Correct! These are the 3 permission types in Linux.

3. Which basic Linux command deletes an empty directory?

  • mv
  • rmdir (CORRECT)
  • rm
  • less

4. Which is not a group that can own a file?

  • anybody (CORRECT)
  • everybody
  • group
  • user

5. Your organization uses a Linux-based network. The legal department has a user group called legal, and this group has access to all the directories that legal employees need. A new legal employee, John J. Smith, just started, and his username is jjsmith. Which command can you use to grant John access to the same directories as all other legal employees?

  • sudogroupadd -g legal jjsmith
  • sudousermod -a -G legal jjsmith (CORRECT)
  • sudogroupmod -g -n legal jjsmith
  • sudogetent group legal jjsmith

Correct. To add a user to a group, you can use the usermod command, which modifies an existing user. In this example, the -a option appends a user to a group without removing the user from other groups. The -G option indicates that at least one group’s name will follow. After the -G option, you must list the group, in this case legal, that you’re adding a user to. Finally, you specify which user you’re adding, in this case jjsmith.

LINUX OPERATING SYSTEM SECURITY BASICS

1. Which three (3) groups can “own” a file in Linux?

  • user, group, everybody (CORRECT)
  • user, team, world
  • system, user, group
  • self, other, all

2. What can be known about a file with permissions set to “-rwxr-x-r–“?

  • The file is a directory and the rwx indicators apply to all files within that directory.
  • The file is a directory, the user can read, write and execute the file; others can read and execute the file, and the group can execute it only.
  • The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. (CORRECT)
  • The user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. You cannot tell the file/directory type from this string.

3. A person using Linux would normally interact directly with which?

  • The HCL.
  • The API.
  • The shell. (CORRECT)
  • The kernel.

4. In the Linux file system, what is the highest level in the directory structure?

  • root (CORRECT)
  • bin
  • home
  • kernel

5. What does the nano command do?

  • nano is a file compression utility.
  • nano displays the first 10 lines of any text file.
  • nano is a basic text file editor. (CORRECT)
  • nano deletes all empty files and directories.

6. When configuring a new application, in which directory should you have it save log files?

  • /log
  • in the same directory where the application is located
  • /var (CORRECT)
  • /bin

7. The Linux “cat” command does which of the following?

  • Puts the file system catalog into edit mode for rapid deletion or insertion of files and directories.
  • Copies file properties.
  • Concatenates 2 or more files together. (CORRECT)
  • Creates a catalog of all files in the file system.

8. Your organization uses a Linux-based network, and you’re configuring Uncomplicated Firewall (ufw). You want to disable file transfers that use the File Transfer Protocol (FTP), which occurs on port 21. Which command can you use to block all traffic on this port?

  • sudoufw deny 21 (CORRECT)
  • sudoufw allow 21
  • sudoufw delete 21
  • sudoufw reload 21

MACOS RESOURCES KNOWLEDGE CHECK

1. What application can you use to see all the active running applications and processes on macOS?

  • Activity Monitor (CORRECT)
  • System information
  • Disk Utility
  • Console

2. What feature in macOS prevents unauthorized applications from being installed?

  • FileVault
  • Firewall
  • Gatekeeper (CORRECT)
  • Apple Watch

3. Which three (3) utilities are found when booting macOS to the recovery partition? (Select 3)

  • Safari (CORRECT)
  • Keychain Access
  • Disk Utility (CORRECT)
  • Time Machine (CORRECT)

Partially correct!

CONCLUSION – Windows Operating System Security Basics

In conclusion, this module has equipped you with a comprehensive understanding of the file system and directory structures inherent to the Windows operating system.

By mastering various shortcuts and commands, you’re now poised to navigate the Windows environment efficiently, enhancing productivity and optimizing information retrieval processes.