Deck 7: Host Hardening

Full screen (f)
exit full mode
Question
If an attacker takes over a firewall, he or she will be able to ________.

A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Systems administrators generally do not manage the network.
Question
________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.

A) Processes
B) Security baselines
C) Procedures
D) None of the above
Question
A company should not replace default passwords during configuration.
Question
A systems administrator may manage ________.

A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B
Question
A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily.

A) snap-in
B) management application
C) administrative application
D) Action
Question
Systems administrators manage individual hosts but not groups of hosts.
Question
Any device with an IP address is a host.
Question
The Microsoft Windows Server interface looks like the interface in ________.

A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Question
MMCs are administrative used to manage ________ servers.

A) Apple
B) Microsoft
C) UNIX
D) All of the above
Question
________ is necessary to protect the host against attacks.

A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above
Question
If an attacker takes over a router, he or she will be able to ________.

A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B
Question
Which of the following are elements of host hardening?

A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B
Question
When you use your mobile firm to surf the Internet, it is a host.
Question
Which of the following statements is not an accurate description of MMCs?

A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.
Question
Which of the following security protections are provided by recent version of Windows Server?

A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B
Question
Any device with an IP address is a ________.

A) server
B) host
C) client
D) None of the above
Question
Which of the following are elements of host hardening?

A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
Question
In MMCs, the tree pane lists ________.

A) objects on which actions can be taken
B) actions that can be taken on the selected object
C) Both A and B
D) Neither A nor B
Question
Microsoft's server operating system is called ________.

A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
Question
A(n) ________ is defined as an attack that comes before fixes are released.

A) exploit
B) zero-day attack
C) worm
D) anomaly attack
Question
A LINUX distribution consists only of the LINUX kernel.
Question
An attack that comes before fixes are released is called a vulnerability attack.
Question
UNIX command line interfaces are called ________.

A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
Question
The core part of the LINUX operating system is called ________.

A) the foundation
B) UNIX
C) GNU
D) the kernel
Question
CLIs usually are easier to learn than GUIs.
Question
CLI shells use more system resources than GUIs.
Question
A(n) ________ is a security weakness that makes a program vulnerable to attack.

A) attack vector
B) exploit
C) vulnerability
D) All of the above
Question
________ is a family of operating systems that share interoperability at the kernel level.

A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
Question
Different UNIX versions have different security methods.
Question
The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows.

A) purchasing
B) using
C) Both A and B
D) Neither A nor B
Question
What is the name for a small program that fixes a particular vulnerability?

A) Work-around
B) Patch
C) Service pack
D) Version upgrade
Question
________ is a version of ________ for PCs.

A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
Question
Attackers frequently create exploits within hours or days after a fix is released by a vendor.
Question
A specific distribution of UNIX comes with multiple user interfaces.
Question
A(n) ________ is a program that takes advantage of a(n) ________.

A) exploit, vulnerability
B) vulnerability, exploit
C) Both A and B
D) Neither A nor B
Question
A ________ is a type of fix for vulnerabilities.

A) work-around
B) service pack
C) Both A and B
D) Neither A nor B
Question
A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements.
Question
A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability.
Question
Which of the following is not a type of fix for vulnerabilities?

A) Work-arounds
B) Patches
C) Version upgrades
D) All of the above are types of fixes for vulnerabilities
Question
A Windows systems administrator should use the Administrator account ________.

A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
Question
The act of taking over a super user account is called hacking root.
Question
Many firms prioritize patches because the cost of installing all patches it too high.
Question
Assigning security measures to groups is ________ than assigning security measures to individuals within groups.

A) cheaper
B) less accurate
C) Both A and B
D) Neither A nor B
Question
Software vendors typically release ________ patches per product in a typical year.

A) many
B) a few
C) no
Question
LINUX commonly uses the rpm method to download patches.
Question
The super user account has ________ control over the computer.

A) total or nearly total
B) substantial but not nearly total
C) little
D) no
Question
The super user account in Windows is called root.
Question
To get to the super user account in UNIX, the administrator should use the ________ command.

A) RunAs
B) su
C) rlogin
D) None of the above
Question
The super user account in Windows is called the ________.

A) root
B) Administrator
C) MMC
D) Super
Question
To get to the super user account in Windows, the administrator can use the ________ command.

A) RunAs
B) su
C) rlogin
D) None of the above
Question
________ can greatly reduce patching costs.

A) Vulnerability management servers
B) Manual downloads
C) Patch management servers
D) All of the above
Question
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
Question
Assigning security measures to groups is better than assigning security measures to individuals within groups because ________.

A) applying security measures to groups takes less time than applying them individually
B) applying security measures in groups reduces errors in assigning security settings
C) Both A and B
D) Neither A nor B
Question
The Local Users and Groups snap-in is available on the ________ MMC.

A) Computer Management
B) Security
C) Permissions
D) Local Permissions
Question
The super user account in UNIX is called ________.

A) root
B) administrator
C) MMC
D) kernel
Question
To get to the super user account in UNIX, the administrator can use the RunAs command.
Question
Vulnerability patches can result in a loss of functionality in the patched host.
Question
Since Windows Server 2003, servers can be programmed to check for updates automatically.
Question
It generally is a good idea from a security point of view to upgrade to a new version of an operating system.
Question
According to the book, r%Dv$ is a strong password.
Question
Inheritance can be modified from the ________ box in the security tab.

A) allow permissions
B) deny permissions
C) Both A and B
D) Neither A nor B
Question
________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Question
UNIX allows permissions to be assigned to ________.

A) the account that owns the file or directory
B) a group associated with the directory
C) everyone else
D) All of the above
Question
Inheritance ________ labor costs in assigning permissions.

A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
Question
UNIX offers more directory and file permissions than Windows.
Question
To how many accounts and groups can different permissions be applied in Windows?

A) 3
B) 6
C) 100
D) almost an unlimited number
Question
The book recommends that passwords be at least ________ characters long.

A) 6
B) 8
C) 20
D) 100
Question
In UNIX, the Execute permission gives the permission to make changes.
Question
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.

A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Question
Long passwords that use several types of keyboard characters are called ________ passwords.

A) complex
B) reusable
C) dictionary
D) one-time
Question
In UNIX, the ________ permission allows the user to make changes.

A) execute
B) write
C) read
D) modify
Question
Which is not one of the three UNIX permissions?

A) Read
B) Write
C) List folder contents
D) Execute
Question
Password hashes are created when a password is passed from a user to a hashing function.
Question
Which of the following is not a standard Windows privilege?

A) Modify
B) All
C) Read & execute
D) List folder contents
Question
In Windows, a user's effective permissions are all those inherited from its parent directory plus any specifically allowed permission, minus those denied.
Question
Stealing the password file from a computer is safer than attempting to log in remotely.
Question
________ allows many different groups to be assigned different permissions.

A) Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Question
UNIX offers ________ directory and file permissions than (as) Windows.

A) fewer
B) more
C) about the same number of
D) None of the above
Question
Windows offers only 3 directory permissions.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Host Hardening
1
If an attacker takes over a firewall, he or she will be able to ________.

A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
D
2
Systems administrators generally do not manage the network.
True
3
________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.

A) Processes
B) Security baselines
C) Procedures
D) None of the above
B
4
A company should not replace default passwords during configuration.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A systems administrator may manage ________.

A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily.

A) snap-in
B) management application
C) administrative application
D) Action
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Systems administrators manage individual hosts but not groups of hosts.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Any device with an IP address is a host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
The Microsoft Windows Server interface looks like the interface in ________.

A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
MMCs are administrative used to manage ________ servers.

A) Apple
B) Microsoft
C) UNIX
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
________ is necessary to protect the host against attacks.

A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
If an attacker takes over a router, he or she will be able to ________.

A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following are elements of host hardening?

A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
When you use your mobile firm to surf the Internet, it is a host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements is not an accurate description of MMCs?

A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following security protections are provided by recent version of Windows Server?

A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Any device with an IP address is a ________.

A) server
B) host
C) client
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following are elements of host hardening?

A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
In MMCs, the tree pane lists ________.

A) objects on which actions can be taken
B) actions that can be taken on the selected object
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Microsoft's server operating system is called ________.

A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ________ is defined as an attack that comes before fixes are released.

A) exploit
B) zero-day attack
C) worm
D) anomaly attack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
A LINUX distribution consists only of the LINUX kernel.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
An attack that comes before fixes are released is called a vulnerability attack.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
UNIX command line interfaces are called ________.

A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
The core part of the LINUX operating system is called ________.

A) the foundation
B) UNIX
C) GNU
D) the kernel
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
CLIs usually are easier to learn than GUIs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
CLI shells use more system resources than GUIs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ________ is a security weakness that makes a program vulnerable to attack.

A) attack vector
B) exploit
C) vulnerability
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
________ is a family of operating systems that share interoperability at the kernel level.

A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Different UNIX versions have different security methods.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows.

A) purchasing
B) using
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
What is the name for a small program that fixes a particular vulnerability?

A) Work-around
B) Patch
C) Service pack
D) Version upgrade
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
________ is a version of ________ for PCs.

A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Attackers frequently create exploits within hours or days after a fix is released by a vendor.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
A specific distribution of UNIX comes with multiple user interfaces.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ________ is a program that takes advantage of a(n) ________.

A) exploit, vulnerability
B) vulnerability, exploit
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ is a type of fix for vulnerabilities.

A) work-around
B) service pack
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is not a type of fix for vulnerabilities?

A) Work-arounds
B) Patches
C) Version upgrades
D) All of the above are types of fixes for vulnerabilities
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
A Windows systems administrator should use the Administrator account ________.

A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
The act of taking over a super user account is called hacking root.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Many firms prioritize patches because the cost of installing all patches it too high.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Assigning security measures to groups is ________ than assigning security measures to individuals within groups.

A) cheaper
B) less accurate
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Software vendors typically release ________ patches per product in a typical year.

A) many
B) a few
C) no
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
LINUX commonly uses the rpm method to download patches.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
The super user account has ________ control over the computer.

A) total or nearly total
B) substantial but not nearly total
C) little
D) no
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The super user account in Windows is called root.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
To get to the super user account in UNIX, the administrator should use the ________ command.

A) RunAs
B) su
C) rlogin
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
The super user account in Windows is called the ________.

A) root
B) Administrator
C) MMC
D) Super
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
To get to the super user account in Windows, the administrator can use the ________ command.

A) RunAs
B) su
C) rlogin
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
________ can greatly reduce patching costs.

A) Vulnerability management servers
B) Manual downloads
C) Patch management servers
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Assigning security measures to groups is better than assigning security measures to individuals within groups because ________.

A) applying security measures to groups takes less time than applying them individually
B) applying security measures in groups reduces errors in assigning security settings
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
The Local Users and Groups snap-in is available on the ________ MMC.

A) Computer Management
B) Security
C) Permissions
D) Local Permissions
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
The super user account in UNIX is called ________.

A) root
B) administrator
C) MMC
D) kernel
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
To get to the super user account in UNIX, the administrator can use the RunAs command.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Vulnerability patches can result in a loss of functionality in the patched host.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Since Windows Server 2003, servers can be programmed to check for updates automatically.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
It generally is a good idea from a security point of view to upgrade to a new version of an operating system.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
According to the book, r%Dv$ is a strong password.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Inheritance can be modified from the ________ box in the security tab.

A) allow permissions
B) deny permissions
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
UNIX allows permissions to be assigned to ________.

A) the account that owns the file or directory
B) a group associated with the directory
C) everyone else
D) All of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Inheritance ________ labor costs in assigning permissions.

A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
UNIX offers more directory and file permissions than Windows.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
To how many accounts and groups can different permissions be applied in Windows?

A) 3
B) 6
C) 100
D) almost an unlimited number
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The book recommends that passwords be at least ________ characters long.

A) 6
B) 8
C) 20
D) 100
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In UNIX, the Execute permission gives the permission to make changes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.

A) A dictionary attack
B) A hybrid dictionary attack
C) A combinatorial attack
D) Brute-force guessing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Long passwords that use several types of keyboard characters are called ________ passwords.

A) complex
B) reusable
C) dictionary
D) one-time
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
In UNIX, the ________ permission allows the user to make changes.

A) execute
B) write
C) read
D) modify
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Which is not one of the three UNIX permissions?

A) Read
B) Write
C) List folder contents
D) Execute
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Password hashes are created when a password is passed from a user to a hashing function.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is not a standard Windows privilege?

A) Modify
B) All
C) Read & execute
D) List folder contents
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
In Windows, a user's effective permissions are all those inherited from its parent directory plus any specifically allowed permission, minus those denied.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Stealing the password file from a computer is safer than attempting to log in remotely.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
________ allows many different groups to be assigned different permissions.

A) Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
UNIX offers ________ directory and file permissions than (as) Windows.

A) fewer
B) more
C) about the same number of
D) None of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Windows offers only 3 directory permissions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.