Exam 14: Baselines

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Securing an application against local-and internet-based attacks is called _______________.

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

application hardening

Securing access to files and directories in Solaris is vastly different from most UNIX variants.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

Adding more services and applications to a system helps to harden it.

Free
(True/False)
4.7/5
(40)
Correct Answer:
Verified

False

_______________ is a term usually applied to a formal,large software update,which may address several software problems.

(Short Answer)
4.9/5
(32)

In Mac OS X,what does library randomization do?

(Multiple Choice)
4.8/5
(31)

Most modern UNIX versions store the passwords associated with a user account in a

(Multiple Choice)
4.9/5
(29)

A _________ is a more formal,large software update that may address several or many software problems.

(Multiple Choice)
4.7/5
(36)

Mac OS X FileVault encrypts files with 3DES encryption.

(True/False)
4.9/5
(36)

What is the process of establishing a system's security state called?

(Multiple Choice)
4.8/5
(31)

List three of the new capabilities of Windows Server 2008.

(Essay)
4.8/5
(32)

When hardening Mac OS X,the same guidelines for all UNIX systems apply.

(True/False)
4.9/5
(33)

_______________ are a mechanism for providing interoperation and secure access to a variety of services on different platforms.

(Short Answer)
4.9/5
(31)

Which of the following is the command to stop a service in UNIX?

(Multiple Choice)
4.9/5
(34)

Which of the following is true of the registry permissions area settings in security templates?

(Multiple Choice)
4.8/5
(32)

Which UNIX command would you use to change permissions associated with a file or directory?

(Multiple Choice)
4.9/5
(35)

The process of planning,deploying,and testing patches in a controlled manner is called _______________.

(Short Answer)
4.8/5
(31)

Which of the following is NOT a UNIX file permission?

(Multiple Choice)
4.7/5
(39)

The process of securing and preparing a system for the production environment is called ________.

(Short Answer)
4.8/5
(33)

The _______________ of a computer is the basic software that handles things such as input,output,display,memory management,and all the other highly detailed tasks required to support the user environment and associated applications.

(Short Answer)
4.8/5
(36)

Selecting a good password for each user account is critical to protecting information systems.How should you select a good password?

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)