Exam 7: Host Hardening

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Many firms prioritize patches because the cost of installing all patches it too high.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

If an attacker takes over a router, he or she will be able to ________.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

The policies for protecting sensitive information should be applied to all mobile data on ________.

(Multiple Choice)
5.0/5
(39)

Systems administrators generally do not manage the network.

(True/False)
4.9/5
(37)

When a computer attempts to connect to a network, NAC queries the PC for information present in the Windows Security Center to determine if all updates are current and AV is working.

(True/False)
4.9/5
(37)

A(n) ________ is a security weakness that makes a program vulnerable to attack.

(Multiple Choice)
5.0/5
(39)

The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows.

(Multiple Choice)
4.9/5
(35)

A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily.

(Multiple Choice)
4.9/5
(40)

________ is a version of ________ for PCs.

(Multiple Choice)
5.0/5
(35)

Software vendors typically release ________ patches per product in a typical year.

(Multiple Choice)
4.7/5
(38)

________ is necessary to protect the host against attacks.

(Multiple Choice)
4.8/5
(36)

Password hashes are created when a password is passed from a user to a hashing function.

(True/False)
4.8/5
(41)

MMCs are administrative used to manage ________ servers.

(Multiple Choice)
4.9/5
(36)

Stealing the password file from a computer is safer than attempting to log in remotely.

(True/False)
4.8/5
(34)

Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.

(True/False)
4.9/5
(30)

Different UNIX versions have different security methods.

(True/False)
4.7/5
(25)

Which of the following is not a type of fix for vulnerabilities?

(Multiple Choice)
4.7/5
(38)

UNIX allows permissions to be assigned to ________.

(Multiple Choice)
4.8/5
(36)

A LINUX distribution consists only of the LINUX kernel.

(True/False)
4.9/5
(40)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)