Exam 1: Operating Systems Security: Keeping Computers and Networks Secure

arrow

7,560 students have unlocked this exam

  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.

Free
(True/False)
4.8/5
(39)
Correct Answer:
Verified

True

Should security or system patches be installed immediately upon their release?

Free
(True/False)
4.8/5
(46)
Correct Answer:
Verified

False

According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?

(True/False)
4.8/5
(30)

When new operating system software is purchased, it should be tested rigorously for security and reliability.

(True/False)
4.8/5
(41)

_____ can translate an IP address from a private network to a different address used on a public network or the Internet.

(Multiple Choice)
4.8/5
(34)

The ____________________ allows you to set a password that governs access to the hard disk drive.

(Short Answer)
4.8/5
(29)

List five types of VPN security that can be provided by operating systems.

(Essay)
4.9/5
(31)

A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.

(Short Answer)
4.9/5
(25)

A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.

(True/False)
4.7/5
(40)

In operating systems, the built-in ____________________ account is typically deactivated or has a password.

(Short Answer)
4.7/5
(33)

What port do Telnet applications use for communication?

(Multiple Choice)
4.7/5
(34)

In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.

(True/False)
4.9/5
(39)

In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.

(True/False)
4.8/5
(36)

Directories or folders and network printers are two important examples of resources that can be shared.

(True/False)
4.7/5
(33)

The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.

(True/False)
4.8/5
(33)

What are the five basic operating system components?

(Essay)
4.8/5
(33)

A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.

(Short Answer)
4.8/5
(29)

Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.

(True/False)
4.8/5
(32)

Does a locked computer operations room guarantee the protection of a network server?

(True/False)
4.8/5
(37)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(9)
  • Multiple Choice(35)
  • Short Answer(11)
  • True False(30)
  • Matching(1)