Exam 15: Computer Security Techniques
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
An effective IDS can serve as a deterrent, thus acting to prevent intrusions.
(True/False)
4.8/5
(42)
The key ingredients of an access matrix are __________ , objects, and access rights.
(Short Answer)
5.0/5
(35)
An antiworm approach that blocks outgoing traffic when a threshold is exceeded is referred to as _________ .
(Multiple Choice)
4.7/5
(37)
The two broad categories of approaches to dealing with buffer overflow attacks are run-time defenses and __________ .
(Short Answer)
4.9/5
(39)
_________ define the type and contents of a security descriptor.
(Short Answer)
5.0/5
(41)
Once a worm is resident on a machine, antivirus software cannot be used to detect it.
(True/False)
4.9/5
(39)
Passwords serve to authenticate the ID of the individual logging on to the system.
(True/False)
4.8/5
(37)
A user only needs a password in order to log on to a UNIX system.
(True/False)
4.7/5
(40)
With a _________ protocol, the user authenticates himself or herself to the token and then the token authenticates the user to the computer.
(Multiple Choice)
4.9/5
(38)
DAC is a concept that evolved out of requirements for military information security.
(True/False)
4.9/5
(32)
__________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.
(Multiple Choice)
4.8/5
(40)
The primary purpose of a(n) _________ is to detect intrusions, log suspicious events, and send alerts.
(Multiple Choice)
4.9/5
(41)
The two types of audit records that may be used in an IDS are detection specific audit records and _________ .
(Short Answer)
4.9/5
(31)
The __________ determines whether the user is authorized to gain access to a system and the privileges accorded to the user.
(Multiple Choice)
4.8/5
(41)
Virtually all multiuser systems, network-based servers, Web-based e-commerce sites, and other similar services require that a user provide not only a name or identifier (ID) but also a _________ .
(Short Answer)
4.9/5
(44)
An important feature of Windows security is that applications can make use of the Windows security framework for user-defined objects.
(True/False)
4.8/5
(43)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)