Exam 12: Operating System Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
______ is a reactive control that can only inform you about bad things that have already happened.
(Essay)
4.8/5
(32)
Manual analysis of logs is a reliable means of detecting adverse
events.
(True/False)
4.9/5
(44)
_______ systems should validate all patches on test systems before deploying them to production systems.
(Essay)
4.9/5
(28)
_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
(Essay)
4.9/5
(33)
______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.
(Essay)
4.8/5
(35)
It is possible for a system to be compromised during the installation
process.
(True/False)
4.8/5
(44)
Guest OSs are managed by a ______,or VMM,that coordinates access between each of the guests and the actual physical hardware resources.
(Essay)
4.7/5
(32)
Security concerns that result from the use of virtualized systems include ______.
(Multiple Choice)
4.8/5
(33)
Ideally new systems should be constructed on an unprotected network
in order to prevent installation restrictions.
(True/False)
5.0/5
(29)
The first critical step in securing a system is to secure the __________.
(Multiple Choice)
4.9/5
(40)
Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.
(Essay)
4.9/5
(32)
The range of logging data acquired should be determined _______.
(Multiple Choice)
4.9/5
(31)
A very common configuration fault seen with Web and file transfer
servers is for all the files supplied by the service to be owned by the
same "user" account that the server executes as.
(True/False)
4.7/5
(32)
Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.
(Multiple Choice)
4.8/5
(27)
The default configuration for many operating systems usually
maximizes security.
(True/False)
4.9/5
(36)
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
(Multiple Choice)
4.9/5
(39)
The most important changes needed to improve system security are to ______.
(Multiple Choice)
4.8/5
(38)
Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.
(Essay)
4.8/5
(24)
______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.
(Essay)
4.7/5
(43)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)