Exam 7: Host Hardening
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
Compared with access permissions in UNIX, permissions in Windows are limited.
(True/False)
4.8/5
(43)
Which of the following is NOT necessarily an advantage provided by GPOs?
(Multiple Choice)
4.9/5
(37)
A ________ approach to password cracking is to try all possible passwords on all accounts.
(Multiple Choice)
4.9/5
(35)
Windows has ________ different specialized permissions to assign.
(Multiple Choice)
4.8/5
(31)
Restricting physical access to a host and encrypting data, if appropriate, are two protections for hardening a host computer.
(True/False)
4.8/5
(37)
Operating systems have used progressively fewer and fewer secure hash functions.
(True/False)
4.9/5
(34)
It is often considered that the value of data of a lost or stolen notebook is often greater than the hardware.
(True/False)
4.7/5
(27)
In UNIX, the ________ command allows you to switch between administrator and a normal account.
(Multiple Choice)
4.7/5
(35)
________ is what makes the most sense for security for PCs in corporations.
(Multiple Choice)
4.9/5
(43)
When you have two operating systems, they each have their own areas of RAM, CPU processing, and hard disk space.
(True/False)
4.8/5
(34)
A ________ is a list of pre-computed password hashes that are indexed.
(Multiple Choice)
4.8/5
(37)
An attacker has to have root permissions to access a shadow file.
(True/False)
4.8/5
(33)
Audit policies would provide a(n) ________ for system events.
(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)