Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______ is a reactive control that can only inform you about bad things that have already happened.

(Essay)
4.8/5
(32)

Manual analysis of logs is a reliable means of detecting adverse events.

(True/False)
4.9/5
(44)

_______ systems should validate all patches on test systems before deploying them to production systems.

(Essay)
4.9/5
(28)

_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.

(Essay)
4.9/5
(33)

______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.

(Essay)
4.8/5
(35)

It is possible for a system to be compromised during the installation process.

(True/False)
4.8/5
(44)

Guest OSs are managed by a ______,or VMM,that coordinates access between each of the guests and the actual physical hardware resources.

(Essay)
4.7/5
(32)

Security concerns that result from the use of virtualized systems include ______.

(Multiple Choice)
4.8/5
(33)

Ideally new systems should be constructed on an unprotected network in order to prevent installation restrictions.

(True/False)
5.0/5
(29)

The first critical step in securing a system is to secure the __________.

(Multiple Choice)
4.9/5
(40)

Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.

(Essay)
4.9/5
(32)

The range of logging data acquired should be determined _______.

(Multiple Choice)
4.9/5
(31)

A very common configuration fault seen with Web and file transfer servers is for all the files supplied by the service to be owned by the same "user" account that the server executes as.

(True/False)
4.7/5
(32)

Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.

(Multiple Choice)
4.8/5
(27)

The default configuration for many operating systems usually maximizes security.

(True/False)
4.9/5
(36)

The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

(Multiple Choice)
4.9/5
(39)

The most important changes needed to improve system security are to ______.

(Multiple Choice)
4.8/5
(38)

Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.

(Essay)
4.8/5
(24)

You should run automatic updates on change-controlled systems.

(True/False)
4.9/5
(30)

______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.

(Essay)
4.7/5
(43)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)