Exam 12: Operating System Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.
(Short Answer)
5.0/5
(39)
_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
(Short Answer)
4.8/5
(32)
The needs and policy relating to backup and archive should be determined ______.
(Multiple Choice)
4.8/5
(39)
Ideally new systems should be constructed on an unprotected network
in order to prevent installation restrictions.
(True/False)
4.7/5
(32)
The default configuration for many operating systems usually
maximizes security.
(True/False)
4.8/5
(30)
______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.
(Short Answer)
4.7/5
(38)
The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
(Short Answer)
4.7/5
(37)
______ systems should not run automatic updates because they may possibly introduce instability.
(Multiple Choice)
4.9/5
(29)
The following steps should be used to secure an operating system:
(Multiple Choice)
4.8/5
(28)
Unix and Linux systems grant access permissions for each resource using the ______ command.
(Short Answer)
4.9/5
(43)
Performing regular backups of data on a system is a critical control
that assists with maintaining the integrity of the system and user data.
(True/False)
4.8/5
(35)
______ virtualization systems are typically seen in servers,with the goal of improving the execution efficiency of the hardware.
(Short Answer)
4.8/5
(42)
Which of the following need to be taken into consideration during the system security planning process?
(Multiple Choice)
4.8/5
(31)
Passwords installed by default are secure and do not need to be
changed.
(True/False)
4.8/5
(36)
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
(Multiple Choice)
4.8/5
(38)
The purpose of the system does not need to be taken into consideration
during the system security planning process.
(True/False)
4.8/5
(43)
A malicious driver can potentially bypass many security controls to
install malware.
(True/False)
4.8/5
(37)
______ are resources that should be used as part of the system security planning process.
(Multiple Choice)
5.0/5
(35)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)