Exam 7: Host Hardening

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

________ can be added or dropped from a tree list.

(Multiple Choice)
5.0/5
(34)

Compared with access permissions in UNIX, permissions in Windows are limited.

(True/False)
4.8/5
(43)

The MMC is the place for administrative tools in a UNIX system.

(True/False)
4.8/5
(36)

Which of the following is NOT necessarily an advantage provided by GPOs?

(Multiple Choice)
4.9/5
(37)

In MMCs, the tree pane lists ________.

(Multiple Choice)
4.9/5
(37)

A ________ approach to password cracking is to try all possible passwords on all accounts.

(Multiple Choice)
4.9/5
(35)

Windows has ________ different specialized permissions to assign.

(Multiple Choice)
4.8/5
(31)

Restricting physical access to a host and encrypting data, if appropriate, are two protections for hardening a host computer.

(True/False)
4.8/5
(37)

The ________ registry of Windows stores passwords.

(Multiple Choice)
4.9/5
(32)

Operating systems have used progressively fewer and fewer secure hash functions.

(True/False)
4.9/5
(34)

Which of the following is NOT a cracking method?

(Multiple Choice)
4.7/5
(38)

It is often considered that the value of data of a lost or stolen notebook is often greater than the hardware.

(True/False)
4.7/5
(27)

In UNIX, the ________ command allows you to switch between administrator and a normal account.

(Multiple Choice)
4.7/5
(35)

________ is what makes the most sense for security for PCs in corporations.

(Multiple Choice)
4.9/5
(43)

UNIX calls command-line interfaces as ________.

(Multiple Choice)
4.9/5
(35)

When you have two operating systems, they each have their own areas of RAM, CPU processing, and hard disk space.

(True/False)
4.8/5
(34)

A ________ is a list of pre-computed password hashes that are indexed.

(Multiple Choice)
4.8/5
(37)

An attacker has to have root permissions to access a shadow file.

(True/False)
4.8/5
(33)

Audit policies would provide a(n) ________ for system events.

(Multiple Choice)
4.9/5
(32)

Antivirus protection is considered ________.

(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)