Exam 12: Operating System Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
(Short Answer)
4.7/5
(34)
________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
(Short Answer)
4.8/5
(31)
The three operating system security layers are: physical hardware, operating system kernel, and _________.
(Short Answer)
4.9/5
(29)
The purpose of the system does not need to be taken into considerationduring the system security planning process.
(True/False)
4.8/5
(27)
A very common configuration fault seen with Web and file transferservers is for all the files supplied by the service to be owned by thesame "user" account that the server executes as.
(True/False)
4.9/5
(43)
______ is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data.
(Short Answer)
4.9/5
(31)
______ are resources that should be used as part of the system security planning process.
(Multiple Choice)
4.8/5
(38)
Security concerns that result from the use of virtualized systems include ______.
(Multiple Choice)
4.9/5
(33)
Ideally new systems should be constructed on an unprotected networkin order to prevent installation restrictions.
(True/False)
4.8/5
(29)
Passwords installed by default are secure and do not need to bechanged.
(True/False)
4.9/5
(32)
It is possible for a system to be compromised during the installationprocess.
(True/False)
4.9/5
(29)
The following steps should be used to secure an operating system:
(Multiple Choice)
4.8/5
(33)
Unix and Linux systems grant access permissions for each resource using the ______ command.
(Short Answer)
4.8/5
(38)
Which of the following need to be taken into consideration during the systemsecurity planning process?
(Multiple Choice)
4.8/5
(36)
______ virtualization systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware.
(Short Answer)
4.9/5
(30)
The final step in the process of initially securing the base operating system is ________.
(Short Answer)
4.7/5
(42)
A malicious driver can potentially bypass many security controls toinstall malware.
(True/False)
4.8/5
(33)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)