Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A plan needs to identify appropriate personnel to install and managethe system, noting any training needed.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

The default configuration for many operating systems usuallymaximizes security.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

The most important changes needed to improve system security are to ______.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

Most large software systems do not have security weaknesses.

(True/False)
4.8/5
(44)

__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

(Multiple Choice)
4.8/5
(24)

______ is a reactive control that can only inform you about bad things that have already happened.

(Short Answer)
4.9/5
(34)

Guest OSs are managed by a ______, or VMM, that coordinates access between each of the guests and the actual physical hardware resources.

(Short Answer)
4.9/5
(37)

The needs and policy relating to backup and archive should be determined ______.

(Multiple Choice)
4.9/5
(35)

The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

(Multiple Choice)
4.8/5
(41)

Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.

(Short Answer)
4.7/5
(28)

Manual analysis of logs is a reliable means of detecting adverseevents.

(True/False)
4.8/5
(34)

_______ systems should validate all patches on test systems before deploying them to production systems.

(Short Answer)
4.9/5
(44)

Configuration information in Windows systems is centralized in the _______, which forms a database of keys and values.

(Short Answer)
4.8/5
(30)

______ systems should not run automatic updates because they may possibly introduce instability.

(Multiple Choice)
4.7/5
(37)

Performing regular backups of data on a system is a critical controlthat assists with maintaining the integrity of the system and user data.

(True/False)
4.8/5
(35)

You should run automatic updates on change-controlled systems.

(True/False)
4.9/5
(28)

______ virtualization systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types.

(Short Answer)
4.9/5
(33)

The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

(Multiple Choice)
4.9/5
(34)

The aim of the specific system installation planning process is to maximize _______ while minimizing costs.

(Short Answer)
4.9/5
(38)

The first step in deploying new systems is _________.

(Multiple Choice)
4.9/5
(45)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)