Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
In UNIX, the ________ permission allows the user to make changes.
A) execute
B) write
C) read
D) modify
Q:
Which is not one of the three UNIX permissions?
A) Read
B) Write
C) List folder contents
D) Execute
Q:
In Windows, a user's effective permissions are all those inherited from its parent directory plus any specifically allowed permission, minus those denied.
Q:
Inheritance can be modified from the ________ box in the security tab.
A) allow permissions
B) deny permissions
C) Both A and B
D) Neither A nor B
Q:
Inheritance ________ labor costs in assigning permissions.
A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above
Q:
To how many accounts and groups can different permissions be applied in Windows?
A) 3
B) 6
C) 100
D) almost an unlimited number
Q:
Which of the following is not a standard Windows privilege?
A) Modify
B) All
C) Read & execute
D) List folder contents
Q:
To get to the super user account in UNIX, the administrator should use the ________ command.
A) RunAs
B) su
C) rlogin
D) None of the above
Q:
To get to the super user account in UNIX, the administrator can use the RunAs command.
Q:
To get to the super user account in Windows, the administrator can use the ________ command.
A) RunAs
B) su
C) rlogin
D) None of the above
Q:
A Windows systems administrator should use the Administrator account ________.
A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
Q:
The act of taking over a super user account is called hacking root.
Q:
The super user account in Windows is called root.
Q:
The super user account in UNIX is called ________.
A) root
B) administrator
C) MMC
D) kernel
Q:
The super user account in Windows is called the ________.
A) root
B) Administrator
C) MMC
D) Super
Q:
The super user account has ________ control over the computer.
A) total or nearly total
B) substantial but not nearly total
C) little
D) no
Q:
The Local Users and Groups snap-in is available on the ________ MMC.
A) Computer Management
B) Security
C) Permissions
D) Local Permissions
Q:
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
Q:
Assigning security measures to groups is ________ than assigning security measures to individuals within groups.
A) cheaper
B) less accurate
C) Both A and B
D) Neither A nor B
Q:
Assigning security measures to groups is better than assigning security measures to individuals within groups because ________.
A) applying security measures to groups takes less time than applying them individually
B) applying security measures in groups reduces errors in assigning security settings
C) Both A and B
D) Neither A nor B
Q:
Vulnerability patches can result in a loss of functionality in the patched host.
Q:
________ can greatly reduce patching costs.
A) Vulnerability management servers
B) Manual downloads
C) Patch management servers
D) All of the above
Q:
Many firms prioritize patches because the cost of installing all patches it too high.
Q:
Software vendors typically release ________ patches per product in a typical year.
A) many
B) a few
C) no
Q:
LINUX commonly uses the rpm method to download patches.
Q:
Since Windows Server 2003, servers can be programmed to check for updates automatically.
Q:
It generally is a good idea from a security point of view to upgrade to a new version of an operating system.
Q:
A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements.
Q:
A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability.
Q:
What is the name for a small program that fixes a particular vulnerability?
A) Work-around
B) Patch
C) Service pack
D) Version upgrade
Q:
A ________ is a type of fix for vulnerabilities.
A) work-around
B) service pack
C) Both A and B
D) Neither A nor B
Q:
Which of the following is not a type of fix for vulnerabilities?
A) Work-arounds
B) Patches
C) Version upgrades
D) All of the above are types of fixes for vulnerabilities
Q:
Attackers frequently create exploits within hours or days after a fix is released by a vendor.
Q:
A(n) ________ is defined as an attack that comes before fixes are released.
A) exploit
B) zero-day attack
C) worm
D) anomaly attack
Q:
An attack that comes before fixes are released is called a vulnerability attack.
Q:
A(n) ________ is a program that takes advantage of a(n) ________.
A) exploit, vulnerability
B) vulnerability, exploit
C) Both A and B
D) Neither A nor B
Q:
A(n) ________ is a security weakness that makes a program vulnerable to attack.
A) attack vector
B) exploit
C) vulnerability
D) All of the above
Q:
CLIs usually are easier to learn than GUIs.
Q:
CLI shells use more system resources than GUIs.
Q:
UNIX command line interfaces are called ________.
A) shells
B) GUIs
C) Both A and B
D) Neither A nor B
Q:
A specific distribution of UNIX comes with multiple user interfaces.
Q:
The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows.
A) purchasing
B) using
C) Both A and B
D) Neither A nor B
Q:
A LINUX distribution consists only of the LINUX kernel.
Q:
The core part of the LINUX operating system is called ________.
A) the foundation
B) UNIX
C) GNU
D) the kernel
Q:
________ is a version of ________ for PCs.
A) LINUX, UNIX
B) UNIX, LINUX
C) Both A and B
D) Neither A nor B
Q:
________ is a family of operating systems that share interoperability at the kernel level.
A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B
Q:
Different UNIX versions have different security methods.
Q:
Which of the following statements is not an accurate description of MMCs?
A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.
Q:
A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily.
A) snap-in
B) management application
C) administrative application
D) Action
Q:
In MMCs, the tree pane lists ________.
A) objects on which actions can be taken
B) actions that can be taken on the selected object
C) Both A and B
D) Neither A nor B
Q:
MMCs are administrative used to manage ________ servers.
A) Apple
B) Microsoft
C) UNIX
D) All of the above
Q:
The Microsoft Windows Server interface looks like the interface in ________.
A) client versions of Microsoft Windows
B) UNIX
C) Both A and B
D) Neither A nor B
Q:
Which of the following security protections are provided by recent version of Windows Server?
A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B
Q:
Microsoft's server operating system is called ________.
A) UNIX
B) Windows Server
C) Both A and B
D) Neither A nor B
Q:
Systems administrators generally do not manage the network.
Q:
Systems administrators manage individual hosts but not groups of hosts.
Q:
A systems administrator may manage ________.
A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B
Q:
________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.
A) Processes
B) Security baselines
C) Procedures
D) None of the above
Q:
A company should not replace default passwords during configuration.
Q:
Which of the following are elements of host hardening?
A) Minimizing applications on the host
B) Having a good border firewall
C) Both A and B
D) Neither A nor B
Q:
Which of the following are elements of host hardening?
A) Encrypting data on the host
B) Read operating system log files
C) Both A and B
D) Neither A nor B
Q:
If an attacker takes over a router, he or she will be able to ________.
A) map the entire internal network
B) reroute traffic to cause a local DoS
C) Both A and B
D) Neither A nor B
Q:
If an attacker takes over a firewall, he or she will be able to ________.
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above
Q:
________ is necessary to protect the host against attacks.
A) Host hardening
B) Host bulwarking
C) Host shielding
D) None of the above
Q:
When you use your mobile firm to surf the Internet, it is a host.
Q:
Any device with an IP address is a host.
Q:
Any device with an IP address is a ________.
A) server
B) host
C) client
D) None of the above
Q:
Windows GPOs can restrict PCs from changing standard configurations.
Q:
After access is granted to a network, many NACs continue to monitor network PCs.
Q:
If a PC fails its initial NAC health assessment, it may be ________.
A) refused access
B) allowed to go to a remediation server and other nonsensitive resources
C) Either A or B
D) Neither A nor B
Q:
When a computer attempts to connect to a network, NAC queries the PC for information present in the Windows Security Center to determine if all updates are current and AV is working.
Q:
Standard configurations ________.
A) afford strong control over the system security configuration
B) reduce maintenance costs
C) Both A and B
D) Neither A nor B
Q:
Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.
Q:
Computer recover software reports its ________ to a recovery company that works with local police to recover the notebook.
A) physical location
B) logical location
C) IP address
D) None of the above.
Q:
The policies for protecting sensitive information should be applied to all mobile data on ________.
A) mobile hard drives
B) USB RAM drives
C) MP3 players
D) All of the above
Q:
Mobile computers should be backed up ________.
A) before being taken off site
B) as soon as brought back on-site
C) Neither A nor B. Mobile computers do not need to be backed up.
D) Both A and B
Q:
Which of the following is a danger created by notebook computer loss or theft?
A) Loss of capital investment
B) Loss of sensitive data
C) Both A and B
D) Neither A nor B
Q:
Antivirus protections may be deliberately turned off by users.
Q:
Which of the following is not a common problem with antivirus protections?
A) Users may turn the AV off.
B) The virus program contract may expire.
C) Automatic updates of virus signatures might be inadvertently turned off.
D) All of the above are common problems with antivirus protections.
Q:
Updating should be done on client PCs ________.
A) manually
B) automatically
C) only after careful testing of the update
D) Client PCs should not be updated.