Deck 1: Operating Systems Security: Keeping Computers and Networks Secure

Full screen (f)
exit full mode
Question
Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
Use Space or
up arrow
down arrow
to flip the card.
Question
WEP is a wireless communications authentication method.
Question
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
Question
Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service.
Question
Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.
Question
The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.
Question
A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.
Question
Using spoofing , an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.
Question
Directories or folders and network printers are two important examples of resources that can be shared.
Question
Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced.
Question
Attacks on wireless networks are sometimes called auto-jacks , because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
Question
Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information.
Question
In the world of computers and networks, the operating system provides both the lock and the key to information.
Question
In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
Question
Many systems use datasets to store data until it is ready to be used.
Question
The API is software that resides between the application software and the operating system kernel.
Question
When new operating system software is purchased, it should be tested rigorously for security and reliability.
Question
A MAN typically goes up to a distance of about 50 miles.
Question
Ping is a utility that network users and administrators frequently use to test a network connection.
Question
In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.
Question
What type of attack occurs when the computer originating the attack causes several other computers to send attack packets?

A) Distributed denial of service
B) Dormant denial of service
C) Duplicated denial of service
D) Distributed destruction of service
Question
Which of the following information about us should be kept private?

A) Family information
B) Employment information
C) Student information
D) Both a and b
E) a, b, and c
Question
One WAN is composed of two or more LANs or MANs that are connected across a distance of more than approximately _____ miles.

A) 10
B) 30
C) 50
D) 100
Question
The traceroute troubleshooting utility can be used by which of the following operating systems?

A) UNIX
B) Mac OS
C) Netware
D) Windows
E) All of the above
Question
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A) Routers
B) Proxy servers
C) Network address translation
D) Packet filters
Question
Which of the following is part of the total cost of ownership of a computer network?

A) Hardware
B) Software
C) User support costs
D) Maintenance
E) All of the above
Question
Most of the first computer networks transmitted data over _____.

A) telephone lines
B) fiber optics
C) copper wires
D) frame relay
Question
A _ ____ is software or hardware placed between two or more networks that selectively allows or denies access.

A) gateway
B) filter
C) firewall
D) DMZ
Question
Operating system and network security is the ability to do which of the following reliably to information?

A) Store
B) Modify
C) Protect
D) Grant access to
E) All of the above
Question
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?

A) 50
B) 65
C) 80
D) 90
Question
What type of attack has occurred when a logged-on computer is used when that person is not present?

A) Spoofing
B) Denial of service
C) Buffer
D) Standalone workstation
Question
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.

A) 30
B) 50
C) 75
D) 100
Question
A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.

A) virus
B) buffer
C) denial of service
D) port scanning
Question
Which of the following is a reason for the failure to fully use the security features of an operating system or network?

A) Lack of time
B) Inadequate training or knowledge of the features
C) A history of doing things only in a specific way
D) All of the above
Question
The _____ translates information from the kernel and device drivers so the application can use it.

A) RPC
B) API
C) BIOS
D) resource manager
Question
Which of the following is a cost of deploying security within an organization?

A) Testing security systems
B) Training users
C) Training consultants
D) Both a and b
E) Both a and c
Question
At a minimum, how many groups does training involve within an organization?

A) 1
B) 2
C) 3
D) 4
Question
What type of attack has occurred when an attacker gains access to a computer through the use of a hidden program?

A) Trojan horse
B) Buffer
C) Worm
D) Source routing
Question
_____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files.

A) Ensuring privacy
B) Workflow
C) Protecting information
D) Compensating for human error
Question
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.

A) destination address
B) source address
C) destination header
D) source data
Question
<strong>  What application protocol is being used in the figure above?</strong> A) TCP B) Telnet C) Ping D) Traceroute <div style=padding-top: 35px> What application protocol is being used in the figure above?

A) TCP
B) Telnet
C) Ping
D) Traceroute
Question
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
Question
A _____ is a fundamental component or container that holds information about all network resources that are grouped within it.

A) workgroup
B) directory service
C) domain
D) forest
Question
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.

A) buffering
B) denial of service
C) worms
D) spoofing
Question
How many ports are there in UDP and TCP?

A) 6,550
B) 63,353
C) 65,535
D) 165,550
Question
Which of the following is a key element used in a wireless attack?

A) Omnidirectional antenna
B) Wireless NIC
C) Passwords
D) Only a and b
E) a, b, and c
Question
Is using the monitoring software that comes with an operating system one of the best places to start when determining the performance and use of an operating system or network?
Question
Should security or system patches be installed immediately upon their release?
Question
What port does DNS use?

A) 21
B) 23
C) 53
D) 110
Question
<strong>  What is displayed in the figure above?</strong> A) Resources in a LAN B) Resources in a WAN C) Resources in a MAN D) Resources in an enterprise network <div style=padding-top: 35px> What is displayed in the figure above?

A) Resources in a LAN
B) Resources in a WAN
C) Resources in a MAN
D) Resources in an enterprise network
Question
In Linux, account security characteristics are controlled through the _____ file, which is normally available only to the system administrator.

A) /etc/shadow
B) /bin/shadow
C) /etc/hosts
D) /etc/passwd
Question
What port do Telnet applications use for communication?

A) 20
B) 21
C) 23
D) 25
Question
Callback security is an example of _____ security

A) filtering
B) remote access
C) object
D) user level
Question
Which organization was started by Coopers and Lybrand as the European Security Forum?

A) Forum of Incident Response and Security Teams
B) SysAdmin, Audit, Network, Security Institute
C) Information Security Forum
D) National Security Institute
Question
Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?
Question
<strong>  Which of the following components are found in section A in the figure above?</strong> A) Word processors B) Device drivers C) Resource managers D) Disk drives E) APIs <div style=padding-top: 35px> Which of the following components are found in section A in the figure above?

A) Word processors
B) Device drivers
C) Resource managers
D) Disk drives
E) APIs
Question
What type of port might be used during a port-scanning attack?

A) Serial
B) Parallel
C) UDP
D) USB
Question
Which organization offers training in security needs and hosts the Certified Protection Professional certification?

A) Computer Emergency Response Team Coordination Center
B) InfraGard
C) Information Systems Security Association
D) American Society for Industrial Security
Question
Do all networks have vulnerable points that require security?
Question
Attackers may get through a specific NAT device by using a form of source routing called _____.

A) a macro
B) spoofing
C) loose source record route
D) multiplexing
Question
Which three NLMs enable a workstation to remotely access the Netware system console?
Question
Is a virus hoax a virus?
Question
Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.
Question
____________________ is a TCP/IP protocol that provides terminal emulation services over a network or the Internet.
Question
List six features that operating systems provide for hardening a system.
Question
One way to help reduce the _________________________ is to purchase systems that are designed to work together in an environment that enables easier and faster configuration.
Question
The ____________________ allows you to set a password that governs access to the hard disk drive.
Question
A(n) ____________________ is ideal for providing security because it takes care of the computer's most basic input/output functions.
Question
Does a locked computer operations room guarantee the protection of a network server?
Question
Will a security policy help to overcome the human factors that diminish security in an organization?
Question
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
Question
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
Question
Is the cost of deploying security more expensive than the cost of not deploying security?
Question
List four hardening techniques that can be used with networks.
Question
____________________ security policies can often help to override politics that limit good security in an organization.
Question
In operating systems, the built-in ____________________ account is typically deactivated or has a password.
Question
List five types of VPN security that can be provided by operating systems.
Question
Do users need training in the use of security tools to help limit human failure and neglect?
Question
The ____________________ communicates with the BIOS, device drivers, and the API to perform operating system functions such as control of memory and storage.
Question
A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Operating Systems Security: Keeping Computers and Networks Secure
1
Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
True
2
WEP is a wireless communications authentication method.
True
3
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
False
4
Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Using spoofing , an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
Directories or folders and network printers are two important examples of resources that can be shared.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
Attacks on wireless networks are sometimes called auto-jacks , because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
In the world of computers and networks, the operating system provides both the lock and the key to information.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
Many systems use datasets to store data until it is ready to be used.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
The API is software that resides between the application software and the operating system kernel.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
When new operating system software is purchased, it should be tested rigorously for security and reliability.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
A MAN typically goes up to a distance of about 50 miles.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
Ping is a utility that network users and administrators frequently use to test a network connection.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
What type of attack occurs when the computer originating the attack causes several other computers to send attack packets?

A) Distributed denial of service
B) Dormant denial of service
C) Duplicated denial of service
D) Distributed destruction of service
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following information about us should be kept private?

A) Family information
B) Employment information
C) Student information
D) Both a and b
E) a, b, and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
One WAN is composed of two or more LANs or MANs that are connected across a distance of more than approximately _____ miles.

A) 10
B) 30
C) 50
D) 100
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
The traceroute troubleshooting utility can be used by which of the following operating systems?

A) UNIX
B) Mac OS
C) Netware
D) Windows
E) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A) Routers
B) Proxy servers
C) Network address translation
D) Packet filters
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is part of the total cost of ownership of a computer network?

A) Hardware
B) Software
C) User support costs
D) Maintenance
E) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Most of the first computer networks transmitted data over _____.

A) telephone lines
B) fiber optics
C) copper wires
D) frame relay
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
A _ ____ is software or hardware placed between two or more networks that selectively allows or denies access.

A) gateway
B) filter
C) firewall
D) DMZ
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
Operating system and network security is the ability to do which of the following reliably to information?

A) Store
B) Modify
C) Protect
D) Grant access to
E) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?

A) 50
B) 65
C) 80
D) 90
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
What type of attack has occurred when a logged-on computer is used when that person is not present?

A) Spoofing
B) Denial of service
C) Buffer
D) Standalone workstation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.

A) 30
B) 50
C) 75
D) 100
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.

A) virus
B) buffer
C) denial of service
D) port scanning
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a reason for the failure to fully use the security features of an operating system or network?

A) Lack of time
B) Inadequate training or knowledge of the features
C) A history of doing things only in a specific way
D) All of the above
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
The _____ translates information from the kernel and device drivers so the application can use it.

A) RPC
B) API
C) BIOS
D) resource manager
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a cost of deploying security within an organization?

A) Testing security systems
B) Training users
C) Training consultants
D) Both a and b
E) Both a and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
At a minimum, how many groups does training involve within an organization?

A) 1
B) 2
C) 3
D) 4
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
What type of attack has occurred when an attacker gains access to a computer through the use of a hidden program?

A) Trojan horse
B) Buffer
C) Worm
D) Source routing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
_____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files.

A) Ensuring privacy
B) Workflow
C) Protecting information
D) Compensating for human error
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.

A) destination address
B) source address
C) destination header
D) source data
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
<strong>  What application protocol is being used in the figure above?</strong> A) TCP B) Telnet C) Ping D) Traceroute What application protocol is being used in the figure above?

A) TCP
B) Telnet
C) Ping
D) Traceroute
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
A _____ is a fundamental component or container that holds information about all network resources that are grouped within it.

A) workgroup
B) directory service
C) domain
D) forest
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.

A) buffering
B) denial of service
C) worms
D) spoofing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
How many ports are there in UDP and TCP?

A) 6,550
B) 63,353
C) 65,535
D) 165,550
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is a key element used in a wireless attack?

A) Omnidirectional antenna
B) Wireless NIC
C) Passwords
D) Only a and b
E) a, b, and c
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Is using the monitoring software that comes with an operating system one of the best places to start when determining the performance and use of an operating system or network?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
Should security or system patches be installed immediately upon their release?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
What port does DNS use?

A) 21
B) 23
C) 53
D) 110
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
<strong>  What is displayed in the figure above?</strong> A) Resources in a LAN B) Resources in a WAN C) Resources in a MAN D) Resources in an enterprise network What is displayed in the figure above?

A) Resources in a LAN
B) Resources in a WAN
C) Resources in a MAN
D) Resources in an enterprise network
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
In Linux, account security characteristics are controlled through the _____ file, which is normally available only to the system administrator.

A) /etc/shadow
B) /bin/shadow
C) /etc/hosts
D) /etc/passwd
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
What port do Telnet applications use for communication?

A) 20
B) 21
C) 23
D) 25
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
Callback security is an example of _____ security

A) filtering
B) remote access
C) object
D) user level
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Which organization was started by Coopers and Lybrand as the European Security Forum?

A) Forum of Incident Response and Security Teams
B) SysAdmin, Audit, Network, Security Institute
C) Information Security Forum
D) National Security Institute
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
<strong>  Which of the following components are found in section A in the figure above?</strong> A) Word processors B) Device drivers C) Resource managers D) Disk drives E) APIs Which of the following components are found in section A in the figure above?

A) Word processors
B) Device drivers
C) Resource managers
D) Disk drives
E) APIs
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
What type of port might be used during a port-scanning attack?

A) Serial
B) Parallel
C) UDP
D) USB
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which organization offers training in security needs and hosts the Certified Protection Professional certification?

A) Computer Emergency Response Team Coordination Center
B) InfraGard
C) Information Systems Security Association
D) American Society for Industrial Security
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
Do all networks have vulnerable points that require security?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Attackers may get through a specific NAT device by using a form of source routing called _____.

A) a macro
B) spoofing
C) loose source record route
D) multiplexing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
Which three NLMs enable a workstation to remotely access the Netware system console?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Is a virus hoax a virus?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ is a TCP/IP protocol that provides terminal emulation services over a network or the Internet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
List six features that operating systems provide for hardening a system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
One way to help reduce the _________________________ is to purchase systems that are designed to work together in an environment that enables easier and faster configuration.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
The ____________________ allows you to set a password that governs access to the hard disk drive.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
A(n) ____________________ is ideal for providing security because it takes care of the computer's most basic input/output functions.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
Does a locked computer operations room guarantee the protection of a network server?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
Will a security policy help to overcome the human factors that diminish security in an organization?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
Is the cost of deploying security more expensive than the cost of not deploying security?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
List four hardening techniques that can be used with networks.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
____________________ security policies can often help to override politics that limit good security in an organization.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
In operating systems, the built-in ____________________ account is typically deactivated or has a password.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
List five types of VPN security that can be provided by operating systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
Do users need training in the use of security tools to help limit human failure and neglect?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
The ____________________ communicates with the BIOS, device drivers, and the API to perform operating system functions such as control of memory and storage.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 86 flashcards in this deck.