Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.

(Short Answer)
5.0/5
(39)

_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.

(Short Answer)
4.8/5
(32)

The needs and policy relating to backup and archive should be determined ______.

(Multiple Choice)
4.8/5
(39)

Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.

(True/False)
4.7/5
(32)

The default configuration for many operating systems usually maximizes security.

(True/False)
4.8/5
(30)

______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.

(Short Answer)
4.7/5
(38)

The aim of the specific system installation planning process is to maximize _______ while minimizing costs.

(Short Answer)
4.7/5
(37)

______ systems should not run automatic updates because they may possibly introduce instability.

(Multiple Choice)
4.9/5
(29)

The following steps should be used to secure an operating system:

(Multiple Choice)
4.8/5
(28)

Unix and Linux systems grant access permissions for each resource using the ______ command.

(Short Answer)
4.9/5
(43)

Lower layer security does not impact upper layers.

(True/False)
4.8/5
(35)

Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data.

(True/False)
4.8/5
(35)

______ virtualization systems are typically seen in servers,with the goal of improving the execution efficiency of the hardware.

(Short Answer)
4.8/5
(42)

Which of the following need to be taken into consideration during the system security planning process?

(Multiple Choice)
4.8/5
(31)

Passwords installed by default are secure and do not need to be changed.

(True/False)
4.8/5
(36)

__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

(Multiple Choice)
4.8/5
(38)

The purpose of the system does not need to be taken into consideration during the system security planning process.

(True/False)
4.8/5
(43)

System security begins with the installation of the ________.

(Short Answer)
4.7/5
(38)

A malicious driver can potentially bypass many security controls to install malware.

(True/False)
4.8/5
(37)

______ are resources that should be used as part of the system security planning process.

(Multiple Choice)
5.0/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)