Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

A plan needs to identify appropriate personnel to install and manage the system,noting any training needed.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

True

The final step in the process of initially securing the base operating system is ________.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

security testing

The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

(Multiple Choice)
4.8/5
(39)

________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.

(Short Answer)
4.9/5
(40)

The first critical step in securing a system is to secure the __________.

(Multiple Choice)
4.8/5
(35)

Most large software systems do not have security weaknesses.

(True/False)
4.9/5
(35)

The most important changes needed to improve system security are to ______.

(Multiple Choice)
4.9/5
(40)

The three operating system security layers are: physical hardware,operating system kernel,and _________.

(Short Answer)
4.8/5
(30)

Manual analysis of logs is a reliable means of detecting adverse events.

(True/False)
4.9/5
(31)

A very common configuration fault seen with Web and file transfer servers is for all the files supplied by the service to be owned by the same "user" account that the server executes as.

(True/False)
4.8/5
(29)

Backup and archive processes are often linked and managed together.

(True/False)
4.9/5
(44)

_______ systems should validate all patches on test systems before deploying them to production systems.

(Short Answer)
4.8/5
(28)

The first step in deploying new systems is _________.

(Multiple Choice)
4.9/5
(37)

______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.

(Short Answer)
4.8/5
(41)

The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

(Multiple Choice)
4.7/5
(31)

Cryptographic file systems are another use of _______.

(Multiple Choice)
4.8/5
(34)

______ is a reactive control that can only inform you about bad things that have already happened.

(Short Answer)
4.9/5
(33)

Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.

(Short Answer)
4.9/5
(29)

You should run automatic updates on change-controlled systems.

(True/False)
4.9/5
(32)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)