Filters
Question type

Study Flashcards

In UNIX, the Execute permission gives the permission to make changes.

Correct Answer

verifed

verified

________ is a family of operating systems that share interoperability at the kernel level.


A) UNIX
B) LINUX
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A company should decide upon a single security baseline for use with its client PCs.

Correct Answer

verifed

verified

A systems administrator may manage ________.


A) an individual host
B) a group of hosts
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Inheritance ________ labor costs in assigning permissions.


A) increases
B) reduces
C) inheritance does not significantly change the labor costs in assigning permissions
D) None of the above

Correct Answer

verifed

verified

Antivirus protections may be deliberately turned off by users.

Correct Answer

verifed

verified

________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type.


A) Processes
B) Security baselines
C) Procedures
D) None of the above

Correct Answer

verifed

verified

Attackers frequently create exploits within hours or days after a fix is released by a vendor.

Correct Answer

verifed

verified

The super user account in UNIX is called ________.


A) root
B) administrator
C) MMC
D) kernel

Correct Answer

verifed

verified

The core part of the LINUX operating system is called ________.


A) the foundation
B) UNIX
C) GNU
D) the kernel

Correct Answer

verifed

verified

Since Windows Server 2003, servers can be programmed to check for updates automatically.

Correct Answer

verifed

verified

Standard configurations ________.


A) afford strong control over the system security configuration
B) reduce maintenance costs
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Which of the following security protections are provided by recent version of Windows Server?


A) Server software firewalls
B) The ability to encrypt data
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

CLI shells use more system resources than GUIs.

Correct Answer

verifed

verified

A(n) ________ is defined as an attack that comes before fixes are released.


A) exploit
B) zero-day attack
C) worm
D) anomaly attack

Correct Answer

verifed

verified

To get to the super user account in UNIX, the administrator should use the ________ command.


A) RunAs
B) su
C) rlogin
D) None of the above

Correct Answer

verifed

verified

A shoulder surfing attack will not be successful unless the attacker can read the entire password.

Correct Answer

verifed

verified

A company should not replace default passwords during configuration.

Correct Answer

verifed

verified

Which of the following is not a common problem with antivirus protections?


A) Users may turn the AV off.
B) The virus program contract may expire.
C) Automatic updates of virus signatures might be inadvertently turned off.
D) All of the above are common problems with antivirus protections.

Correct Answer

verifed

verified

Which of the following statements is not an accurate description of MMCs?


A) MMCs are produced by Microsoft.
B) MMCs are located under the Start / Management menu choice.
C) MMCs use GUIs.
D) MMCs are relatively easy to learn to use.

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer