Exam 1: Operating Systems Security: Keeping Computers and Networks Secure
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
Free
(True/False)
4.8/5
(39)
Correct Answer:
True
Should security or system patches be installed immediately upon their release?
Free
(True/False)
4.8/5
(46)
Correct Answer:
False
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?
(True/False)
4.8/5
(30)
When new operating system software is purchased, it should be tested rigorously for security and reliability.
(True/False)
4.8/5
(41)
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.
(Multiple Choice)
4.8/5
(34)
The ____________________ allows you to set a password that governs access to the hard disk drive.
(Short Answer)
4.8/5
(29)
List five types of VPN security that can be provided by operating systems.
(Essay)
4.9/5
(31)
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
(Short Answer)
4.9/5
(25)
A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.
(True/False)
4.7/5
(40)
In operating systems, the built-in ____________________ account is typically deactivated or has a password.
(Short Answer)
4.7/5
(33)
In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.
(True/False)
4.9/5
(39)
In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
(True/False)
4.8/5
(36)
Directories or folders and network printers are two important examples of resources that can be shared.
(True/False)
4.7/5
(33)
The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.
(True/False)
4.8/5
(33)
A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.
(Short Answer)
4.8/5
(29)
Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.
(True/False)
4.8/5
(32)
Does a locked computer operations room guarantee the protection of a network server?
(True/False)
4.8/5
(37)
Showing 1 - 20 of 86
Filters
- Essay(9)
- Multiple Choice(35)
- Short Answer(11)
- True False(30)
- Matching(1)