Exam 12: Operating System Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
A plan needs to identify appropriate personnel to install and manage
the system,noting any training needed.
Free
(True/False)
4.8/5
(31)
Correct Answer:
True
The final step in the process of initially securing the base operating system is ________.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
security testing
The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.
(Multiple Choice)
4.8/5
(39)
________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
(Short Answer)
4.9/5
(40)
The first critical step in securing a system is to secure the __________.
(Multiple Choice)
4.8/5
(35)
The most important changes needed to improve system security are to ______.
(Multiple Choice)
4.9/5
(40)
The three operating system security layers are: physical hardware,operating system kernel,and _________.
(Short Answer)
4.8/5
(30)
Manual analysis of logs is a reliable means of detecting adverse
events.
(True/False)
4.9/5
(31)
A very common configuration fault seen with Web and file transfer
servers is for all the files supplied by the service to be owned by the
same "user" account that the server executes as.
(True/False)
4.8/5
(29)
Backup and archive processes are often linked and managed together.
(True/False)
4.9/5
(44)
_______ systems should validate all patches on test systems before deploying them to production systems.
(Short Answer)
4.8/5
(28)
______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.
(Short Answer)
4.8/5
(41)
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
(Multiple Choice)
4.7/5
(31)
______ is a reactive control that can only inform you about bad things that have already happened.
(Short Answer)
4.9/5
(33)
Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.
(Short Answer)
4.9/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)