Exam 12: Operating System Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A plan needs to identify appropriate personnel to install and managethe system, noting any training needed.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
The default configuration for many operating systems usuallymaximizes security.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
The most important changes needed to improve system security are to ______.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
(Multiple Choice)
4.8/5
(24)
______ is a reactive control that can only inform you about bad things that have already happened.
(Short Answer)
4.9/5
(34)
Guest OSs are managed by a ______, or VMM, that coordinates access between each of the guests and the actual physical hardware resources.
(Short Answer)
4.9/5
(37)
The needs and policy relating to backup and archive should be determined ______.
(Multiple Choice)
4.9/5
(35)
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
(Multiple Choice)
4.8/5
(41)
Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.
(Short Answer)
4.7/5
(28)
Manual analysis of logs is a reliable means of detecting adverseevents.
(True/False)
4.8/5
(34)
_______ systems should validate all patches on test systems before deploying them to production systems.
(Short Answer)
4.9/5
(44)
Configuration information in Windows systems is centralized in the _______, which forms a database of keys and values.
(Short Answer)
4.8/5
(30)
______ systems should not run automatic updates because they may possibly introduce instability.
(Multiple Choice)
4.7/5
(37)
Performing regular backups of data on a system is a critical controlthat assists with maintaining the integrity of the system and user data.
(True/False)
4.8/5
(35)
______ virtualization systems are more common in clients, where they run along side other applications on the host OS, and are used to support applications for alternate operating system versions or types.
(Short Answer)
4.9/5
(33)
The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.
(Multiple Choice)
4.9/5
(34)
The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
(Short Answer)
4.9/5
(38)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)