Exam 12: Operating System Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.

(Short Answer)
4.7/5
(34)

________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.

(Short Answer)
4.8/5
(31)

Cryptographic file systems are another use of _______.

(Multiple Choice)
4.8/5
(33)

The three operating system security layers are: physical hardware, operating system kernel, and _________.

(Short Answer)
4.9/5
(29)

The purpose of the system does not need to be taken into considerationduring the system security planning process.

(True/False)
4.8/5
(27)

A very common configuration fault seen with Web and file transferservers is for all the files supplied by the service to be owned by thesame "user" account that the server executes as.

(True/False)
4.9/5
(43)

______ is the process of retaining copies of data over extended periods of time, being months or years, in order to meet legal and operational requirements to access past data.

(Short Answer)
4.9/5
(31)

______ are resources that should be used as part of the system security planning process.

(Multiple Choice)
4.8/5
(38)

Security concerns that result from the use of virtualized systems include ______.

(Multiple Choice)
4.9/5
(33)

Ideally new systems should be constructed on an unprotected networkin order to prevent installation restrictions.

(True/False)
4.8/5
(29)

Passwords installed by default are secure and do not need to bechanged.

(True/False)
4.9/5
(32)

System security begins with the installation of the ________.

(Short Answer)
4.8/5
(36)

It is possible for a system to be compromised during the installationprocess.

(True/False)
4.9/5
(29)

The following steps should be used to secure an operating system:

(Multiple Choice)
4.8/5
(33)

Unix and Linux systems grant access permissions for each resource using the ______ command.

(Short Answer)
4.8/5
(38)

Which of the following need to be taken into consideration during the systemsecurity planning process?

(Multiple Choice)
4.8/5
(36)

Lower layer security does not impact upper layers.

(True/False)
4.8/5
(31)

______ virtualization systems are typically seen in servers, with the goal of improving the execution efficiency of the hardware.

(Short Answer)
4.9/5
(30)

The final step in the process of initially securing the base operating system is ________.

(Short Answer)
4.7/5
(42)

A malicious driver can potentially bypass many security controls toinstall malware.

(True/False)
4.8/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)