Exam 8: Operating System Hardening
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
In Microsoft Windows,the ____________ is a database of settings and options that control the operating system.
(Short Answer)
4.8/5
(38)
Microsoft's Internet Information Service (IIS)creates a special default user account called ____________ followed by the computer name.
(Short Answer)
4.8/5
(29)
Why do some Windows system administrators recommend leaving the default administrator account enabled but moving it from the administrator's group and greatly restricting privileges?
(Multiple Choice)
4.9/5
(33)
The concept of hardening the operating system involves properly configuring every machine for ____________ security.
(Multiple Choice)
4.9/5
(43)
Which is NOT a recommendation for securing Linux operating systems?
(Multiple Choice)
4.9/5
(35)
One of the first steps in hardening the operating system is to disable the default ____________ account and add a new one with an innocent sounding name.
(Short Answer)
4.8/5
(33)
Turning on port ____________ to prevent unwanted traffic is a basic hardening step when using Windows 2000 or XP Internet Connection Firewall.
(Short Answer)
4.9/5
(35)
Showing 21 - 28 of 28
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)