Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Passwords installed by default are secure and do not need to be changed.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

Most large software systems do not have security weaknesses.

Free
(True/False)
4.9/5
(44)
Correct Answer:
Verified

False

Each layer of code needs appropriate hardening measures in place to provide appropriate security services.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

______ systems should not run automatic updates because they may possibly introduce instability.

(Multiple Choice)
4.8/5
(25)

Cryptographic file systems are another use of _______.

(Multiple Choice)
4.9/5
(39)

A plan needs to identify appropriate personnel to install and manage the system,noting any training needed.

(True/False)
4.8/5
(37)

______ are resources that should be used as part of the system security planning process.

(Multiple Choice)
4.9/5
(36)

The needs and policy relating to backup and archive should be determined ______.

(Multiple Choice)
4.7/5
(36)

Unix and Linux systems grant access permissions for each resource using the ______ command.

(Essay)
4.9/5
(25)

The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

(Multiple Choice)
4.8/5
(35)

________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.

(Essay)
4.7/5
(28)

Backup and archive processes are often linked and managed together.

(True/False)
4.8/5
(35)

The three operating system security layers are: physical hardware,operating system kernel,and _________.

(Essay)
4.8/5
(33)

Lower layer security does not impact upper layers.

(True/False)
4.8/5
(37)

Which of the following need to be taken into consideration during the system security planning process?

(Multiple Choice)
4.8/5
(32)

The final step in the process of initially securing the base operating system is ________.

(Essay)
4.8/5
(40)

Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data.

(True/False)
4.9/5
(39)

The following steps should be used to secure an operating system:

(Multiple Choice)
4.7/5
(25)

The purpose of the system does not need to be taken into consideration during the system security planning process.

(True/False)
4.9/5
(40)

System security begins with the installation of the ________.

(Essay)
4.8/5
(45)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)