Deck 1: Operating Systems Security: Keeping Computers and Networks Secure

ملء الشاشة (f)
exit full mode
سؤال
Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
WEP is a wireless communications authentication method.
سؤال
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
سؤال
Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service.
سؤال
Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.
سؤال
The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.
سؤال
A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.
سؤال
Using spoofing , an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.
سؤال
Directories or folders and network printers are two important examples of resources that can be shared.
سؤال
Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced.
سؤال
Attacks on wireless networks are sometimes called auto-jacks , because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
سؤال
Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information.
سؤال
In the world of computers and networks, the operating system provides both the lock and the key to information.
سؤال
In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
سؤال
Many systems use datasets to store data until it is ready to be used.
سؤال
The API is software that resides between the application software and the operating system kernel.
سؤال
When new operating system software is purchased, it should be tested rigorously for security and reliability.
سؤال
A MAN typically goes up to a distance of about 50 miles.
سؤال
Ping is a utility that network users and administrators frequently use to test a network connection.
سؤال
In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.
سؤال
What type of attack occurs when the computer originating the attack causes several other computers to send attack packets?

A) Distributed denial of service
B) Dormant denial of service
C) Duplicated denial of service
D) Distributed destruction of service
سؤال
Which of the following information about us should be kept private?

A) Family information
B) Employment information
C) Student information
D) Both a and b
E) a, b, and c
سؤال
One WAN is composed of two or more LANs or MANs that are connected across a distance of more than approximately _____ miles.

A) 10
B) 30
C) 50
D) 100
سؤال
The traceroute troubleshooting utility can be used by which of the following operating systems?

A) UNIX
B) Mac OS
C) Netware
D) Windows
E) All of the above
سؤال
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A) Routers
B) Proxy servers
C) Network address translation
D) Packet filters
سؤال
Which of the following is part of the total cost of ownership of a computer network?

A) Hardware
B) Software
C) User support costs
D) Maintenance
E) All of the above
سؤال
Most of the first computer networks transmitted data over _____.

A) telephone lines
B) fiber optics
C) copper wires
D) frame relay
سؤال
A _ ____ is software or hardware placed between two or more networks that selectively allows or denies access.

A) gateway
B) filter
C) firewall
D) DMZ
سؤال
Operating system and network security is the ability to do which of the following reliably to information?

A) Store
B) Modify
C) Protect
D) Grant access to
E) All of the above
سؤال
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?

A) 50
B) 65
C) 80
D) 90
سؤال
What type of attack has occurred when a logged-on computer is used when that person is not present?

A) Spoofing
B) Denial of service
C) Buffer
D) Standalone workstation
سؤال
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.

A) 30
B) 50
C) 75
D) 100
سؤال
A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.

A) virus
B) buffer
C) denial of service
D) port scanning
سؤال
Which of the following is a reason for the failure to fully use the security features of an operating system or network?

A) Lack of time
B) Inadequate training or knowledge of the features
C) A history of doing things only in a specific way
D) All of the above
سؤال
The _____ translates information from the kernel and device drivers so the application can use it.

A) RPC
B) API
C) BIOS
D) resource manager
سؤال
Which of the following is a cost of deploying security within an organization?

A) Testing security systems
B) Training users
C) Training consultants
D) Both a and b
E) Both a and c
سؤال
At a minimum, how many groups does training involve within an organization?

A) 1
B) 2
C) 3
D) 4
سؤال
What type of attack has occurred when an attacker gains access to a computer through the use of a hidden program?

A) Trojan horse
B) Buffer
C) Worm
D) Source routing
سؤال
_____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files.

A) Ensuring privacy
B) Workflow
C) Protecting information
D) Compensating for human error
سؤال
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.

A) destination address
B) source address
C) destination header
D) source data
سؤال
<strong>  What application protocol is being used in the figure above?</strong> A) TCP B) Telnet C) Ping D) Traceroute <div style=padding-top: 35px> What application protocol is being used in the figure above?

A) TCP
B) Telnet
C) Ping
D) Traceroute
سؤال
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
سؤال
A _____ is a fundamental component or container that holds information about all network resources that are grouped within it.

A) workgroup
B) directory service
C) domain
D) forest
سؤال
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.

A) buffering
B) denial of service
C) worms
D) spoofing
سؤال
How many ports are there in UDP and TCP?

A) 6,550
B) 63,353
C) 65,535
D) 165,550
سؤال
Which of the following is a key element used in a wireless attack?

A) Omnidirectional antenna
B) Wireless NIC
C) Passwords
D) Only a and b
E) a, b, and c
سؤال
Is using the monitoring software that comes with an operating system one of the best places to start when determining the performance and use of an operating system or network?
سؤال
Should security or system patches be installed immediately upon their release?
سؤال
What port does DNS use?

A) 21
B) 23
C) 53
D) 110
سؤال
<strong>  What is displayed in the figure above?</strong> A) Resources in a LAN B) Resources in a WAN C) Resources in a MAN D) Resources in an enterprise network <div style=padding-top: 35px> What is displayed in the figure above?

A) Resources in a LAN
B) Resources in a WAN
C) Resources in a MAN
D) Resources in an enterprise network
سؤال
In Linux, account security characteristics are controlled through the _____ file, which is normally available only to the system administrator.

A) /etc/shadow
B) /bin/shadow
C) /etc/hosts
D) /etc/passwd
سؤال
What port do Telnet applications use for communication?

A) 20
B) 21
C) 23
D) 25
سؤال
Callback security is an example of _____ security

A) filtering
B) remote access
C) object
D) user level
سؤال
Which organization was started by Coopers and Lybrand as the European Security Forum?

A) Forum of Incident Response and Security Teams
B) SysAdmin, Audit, Network, Security Institute
C) Information Security Forum
D) National Security Institute
سؤال
Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?
سؤال
<strong>  Which of the following components are found in section A in the figure above?</strong> A) Word processors B) Device drivers C) Resource managers D) Disk drives E) APIs <div style=padding-top: 35px> Which of the following components are found in section A in the figure above?

A) Word processors
B) Device drivers
C) Resource managers
D) Disk drives
E) APIs
سؤال
What type of port might be used during a port-scanning attack?

A) Serial
B) Parallel
C) UDP
D) USB
سؤال
Which organization offers training in security needs and hosts the Certified Protection Professional certification?

A) Computer Emergency Response Team Coordination Center
B) InfraGard
C) Information Systems Security Association
D) American Society for Industrial Security
سؤال
Do all networks have vulnerable points that require security?
سؤال
Attackers may get through a specific NAT device by using a form of source routing called _____.

A) a macro
B) spoofing
C) loose source record route
D) multiplexing
سؤال
Which three NLMs enable a workstation to remotely access the Netware system console?
سؤال
Is a virus hoax a virus?
سؤال
Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.
سؤال
____________________ is a TCP/IP protocol that provides terminal emulation services over a network or the Internet.
سؤال
List six features that operating systems provide for hardening a system.
سؤال
One way to help reduce the _________________________ is to purchase systems that are designed to work together in an environment that enables easier and faster configuration.
سؤال
The ____________________ allows you to set a password that governs access to the hard disk drive.
سؤال
A(n) ____________________ is ideal for providing security because it takes care of the computer's most basic input/output functions.
سؤال
Does a locked computer operations room guarantee the protection of a network server?
سؤال
Will a security policy help to overcome the human factors that diminish security in an organization?
سؤال
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
سؤال
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
سؤال
Is the cost of deploying security more expensive than the cost of not deploying security?
سؤال
List four hardening techniques that can be used with networks.
سؤال
____________________ security policies can often help to override politics that limit good security in an organization.
سؤال
In operating systems, the built-in ____________________ account is typically deactivated or has a password.
سؤال
List five types of VPN security that can be provided by operating systems.
سؤال
Do users need training in the use of security tools to help limit human failure and neglect?
سؤال
The ____________________ communicates with the BIOS, device drivers, and the API to perform operating system functions such as control of memory and storage.
سؤال
A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Operating Systems Security: Keeping Computers and Networks Secure
1
Hardening involves taking specific actions to block or prevent attacks by means of operating system and network security methods.
True
2
WEP is a wireless communications authentication method.
True
3
NDS is a directory service used by Windows 2003 Server to provide a central listing of resources.
False
4
Remote access security involves requiring a user account and password to access a particular operating system or to be validated to access a network through a directory service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
5
Strobe and Nmap are two popular port-scanning programs that are used to find open ports on a remote system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
6
The Trojan horse program Trojan.Idly is designed to give the attacker command line access to the remote operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
7
A(n) socket is like a virtual circuit between two services or processes communicating between two different computers or network devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
8
Using spoofing , an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
9
Directories or folders and network printers are two important examples of resources that can be shared.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
10
Employing disaster recovery is vital when a hard disk is damaged or crashes and must be replaced.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
11
Attacks on wireless networks are sometimes called auto-jacks , because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
12
Source routing attacks are used to interfere with normal access to a network host, Web site, or service by flooding a network with useless information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
13
In the world of computers and networks, the operating system provides both the lock and the key to information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
14
In LinkState routing, the sender of a packet specifies the precise path that the packet will take to reach its destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
15
Many systems use datasets to store data until it is ready to be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
16
The API is software that resides between the application software and the operating system kernel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
17
When new operating system software is purchased, it should be tested rigorously for security and reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
18
A MAN typically goes up to a distance of about 50 miles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
19
Ping is a utility that network users and administrators frequently use to test a network connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
20
In order to successfully use logon security, users must be taught to keep their passwords confidential and to choose passwords that are difficult to guess.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
21
What type of attack occurs when the computer originating the attack causes several other computers to send attack packets?

A) Distributed denial of service
B) Dormant denial of service
C) Duplicated denial of service
D) Distributed destruction of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following information about us should be kept private?

A) Family information
B) Employment information
C) Student information
D) Both a and b
E) a, b, and c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
23
One WAN is composed of two or more LANs or MANs that are connected across a distance of more than approximately _____ miles.

A) 10
B) 30
C) 50
D) 100
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
24
The traceroute troubleshooting utility can be used by which of the following operating systems?

A) UNIX
B) Mac OS
C) Netware
D) Windows
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A) Routers
B) Proxy servers
C) Network address translation
D) Packet filters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is part of the total cost of ownership of a computer network?

A) Hardware
B) Software
C) User support costs
D) Maintenance
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
27
Most of the first computer networks transmitted data over _____.

A) telephone lines
B) fiber optics
C) copper wires
D) frame relay
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _ ____ is software or hardware placed between two or more networks that selectively allows or denies access.

A) gateway
B) filter
C) firewall
D) DMZ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
29
Operating system and network security is the ability to do which of the following reliably to information?

A) Store
B) Modify
C) Protect
D) Grant access to
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
30
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?

A) 50
B) 65
C) 80
D) 90
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
31
What type of attack has occurred when a logged-on computer is used when that person is not present?

A) Spoofing
B) Denial of service
C) Buffer
D) Standalone workstation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
32
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.

A) 30
B) 50
C) 75
D) 100
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
33
A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.

A) virus
B) buffer
C) denial of service
D) port scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is a reason for the failure to fully use the security features of an operating system or network?

A) Lack of time
B) Inadequate training or knowledge of the features
C) A history of doing things only in a specific way
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
35
The _____ translates information from the kernel and device drivers so the application can use it.

A) RPC
B) API
C) BIOS
D) resource manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is a cost of deploying security within an organization?

A) Testing security systems
B) Training users
C) Training consultants
D) Both a and b
E) Both a and c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
37
At a minimum, how many groups does training involve within an organization?

A) 1
B) 2
C) 3
D) 4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
38
What type of attack has occurred when an attacker gains access to a computer through the use of a hidden program?

A) Trojan horse
B) Buffer
C) Worm
D) Source routing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files.

A) Ensuring privacy
B) Workflow
C) Protecting information
D) Compensating for human error
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
40
In a source routing attack, the attacker modifies the _____ and routing information to make a packet appear to come from a different source, such as one that is already trusted for communications on a network.

A) destination address
B) source address
C) destination header
D) source data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
41
<strong>  What application protocol is being used in the figure above?</strong> A) TCP B) Telnet C) Ping D) Traceroute What application protocol is being used in the figure above?

A) TCP
B) Telnet
C) Ping
D) Traceroute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
42
Do the operating system device drivers coordinate operating system functions such as control of memory and storage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
43
A _____ is a fundamental component or container that holds information about all network resources that are grouped within it.

A) workgroup
B) directory service
C) domain
D) forest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
44
Using _____, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected.

A) buffering
B) denial of service
C) worms
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
45
How many ports are there in UDP and TCP?

A) 6,550
B) 63,353
C) 65,535
D) 165,550
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is a key element used in a wireless attack?

A) Omnidirectional antenna
B) Wireless NIC
C) Passwords
D) Only a and b
E) a, b, and c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
47
Is using the monitoring software that comes with an operating system one of the best places to start when determining the performance and use of an operating system or network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
48
Should security or system patches be installed immediately upon their release?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
49
What port does DNS use?

A) 21
B) 23
C) 53
D) 110
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
50
<strong>  What is displayed in the figure above?</strong> A) Resources in a LAN B) Resources in a WAN C) Resources in a MAN D) Resources in an enterprise network What is displayed in the figure above?

A) Resources in a LAN
B) Resources in a WAN
C) Resources in a MAN
D) Resources in an enterprise network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
51
In Linux, account security characteristics are controlled through the _____ file, which is normally available only to the system administrator.

A) /etc/shadow
B) /bin/shadow
C) /etc/hosts
D) /etc/passwd
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
52
What port do Telnet applications use for communication?

A) 20
B) 21
C) 23
D) 25
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
53
Callback security is an example of _____ security

A) filtering
B) remote access
C) object
D) user level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which organization was started by Coopers and Lybrand as the European Security Forum?

A) Forum of Incident Response and Security Teams
B) SysAdmin, Audit, Network, Security Institute
C) Information Security Forum
D) National Security Institute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
55
Is the goal of disaster recovery to enable you to restore systems and data without losing critical information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
56
<strong>  Which of the following components are found in section A in the figure above?</strong> A) Word processors B) Device drivers C) Resource managers D) Disk drives E) APIs Which of the following components are found in section A in the figure above?

A) Word processors
B) Device drivers
C) Resource managers
D) Disk drives
E) APIs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
57
What type of port might be used during a port-scanning attack?

A) Serial
B) Parallel
C) UDP
D) USB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which organization offers training in security needs and hosts the Certified Protection Professional certification?

A) Computer Emergency Response Team Coordination Center
B) InfraGard
C) Information Systems Security Association
D) American Society for Industrial Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
59
Do all networks have vulnerable points that require security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
60
Attackers may get through a specific NAT device by using a form of source routing called _____.

A) a macro
B) spoofing
C) loose source record route
D) multiplexing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which three NLMs enable a workstation to remotely access the Netware system console?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
62
Is a virus hoax a virus?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
63
Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
64
____________________ is a TCP/IP protocol that provides terminal emulation services over a network or the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
65
List six features that operating systems provide for hardening a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
66
One way to help reduce the _________________________ is to purchase systems that are designed to work together in an environment that enables easier and faster configuration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
67
The ____________________ allows you to set a password that governs access to the hard disk drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
68
A(n) ____________________ is ideal for providing security because it takes care of the computer's most basic input/output functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
69
Does a locked computer operations room guarantee the protection of a network server?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
70
Will a security policy help to overcome the human factors that diminish security in an organization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
71
List five organizations that provide information, assistance, and training in types of system attacks and how to prevent them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
72
A key characteristic of a(n) ____________________ network is the availability of different resources that enable users to fulfill business, research, and educational tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
73
Is the cost of deploying security more expensive than the cost of not deploying security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
74
List four hardening techniques that can be used with networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
75
____________________ security policies can often help to override politics that limit good security in an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
76
In operating systems, the built-in ____________________ account is typically deactivated or has a password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
77
List five types of VPN security that can be provided by operating systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
78
Do users need training in the use of security tools to help limit human failure and neglect?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
79
The ____________________ communicates with the BIOS, device drivers, and the API to perform operating system functions such as control of memory and storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
80
A(n) ____________________ attack is typically intended to shut down a site or service but does not usually damage information or systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.