Exam 8: Operating System Hardening
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Certain Microsoft Web applications require a special default user account be created called ____________.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
ASP.NET
Information and settings for all the hardware,software,users,and preferences for any Microsoft Windows computer are maintained in the:
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
D
Which is NOT a privacy or security setting recommended for Netscape Navigator?
Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
A
What does the author suggest is probably the single greatest security threat to an individual system or corporate network?
(Multiple Choice)
4.7/5
(29)
With Windows 2000 or newer,transparent file encryption is maintained by ____________.
(Short Answer)
5.0/5
(30)
What version of Windows operating system provides the ability to set application policies?
(Multiple Choice)
4.7/5
(35)
It is important for system administrators to remember that ____________ security is also the least usable.
(Short Answer)
4.8/5
(23)
Why are the default Windows account lockout policies considered not secure?
(Multiple Choice)
4.8/5
(26)
The entire set of rules governing passwords such as length,age,complexity,and history is known as password ____________.
(Short Answer)
4.8/5
(34)
____________ the operating system refers to the process of properly configuring security on each machine,including servers.
(Short Answer)
4.9/5
(40)
When using Windows 2000 or newer file encryption capabilities,files are automatically encrypted and decrypted because the process is ____________ for the same user on the same machine.
(Short Answer)
4.8/5
(39)
In Windows XP,what is the name of the file that contains the system registry information for that particular computer?
(Multiple Choice)
4.8/5
(28)
What steps should be taken to lessen hacker threats from Windows default accounts?
(Multiple Choice)
4.8/5
(37)
Due to the increase in spyware,____________ settings are as important as security settings in hardening the operating system.
(Short Answer)
4.7/5
(39)
Showing 1 - 20 of 28
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)