Deck 12: Operating System Security

ملء الشاشة (f)
exit full mode
سؤال
It is possible for a system to be compromised during the installation
process.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Backup and archive processes are often linked and managed together.
سؤال
The purpose of the system does not need to be taken into consideration
during the system security planning process.
سؤال
The first step in deploying new systems is _________.

A)security testing
B)installing patches
C)planning
D)secure critical content
سؤال
Manual analysis of logs is a reliable means of detecting adverse
events.
سؤال
The first critical step in securing a system is to secure the __________.

A)base operating system
B)system administrator
C)malware protection mechanisms
D)remote access privileges
سؤال
You should run automatic updates on change-controlled systems.
سؤال
Lower layer security does not impact upper layers.
سؤال
A plan needs to identify appropriate personnel to install and manage
the system,noting any training needed.
سؤال
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

A)Virtualizing
B)White listing
C)Logging
D)Patching
سؤال
Most large software systems do not have security weaknesses.
سؤال
The following steps should be used to secure an operating system:

A)test the security of the basic operating system
B)remove unnecessary services
C)install and patch the operating system
D)all of the above
سؤال
Each layer of code needs appropriate hardening measures in place to
provide appropriate security services.
سؤال
A very common configuration fault seen with Web and file transfer
servers is for all the files supplied by the service to be owned by the
same "user" account that the server executes as.
سؤال
Ideally new systems should be constructed on an unprotected network
in order to prevent installation restrictions.
سؤال
Passwords installed by default are secure and do not need to be
changed.
سؤال
Which of the following need to be taken into consideration during the system security planning process?

A)how users are authenticated
B)the categories of users of the system
C)what access the system has to information stored on other hosts
D)all of the above
سؤال
The default configuration for many operating systems usually
maximizes security.
سؤال
Performing regular backups of data on a system is a critical control
that assists with maintaining the integrity of the system and user data.
سؤال
A malicious driver can potentially bypass many security controls to
install malware.
سؤال
Cryptographic file systems are another use of _______.

A)encryption
B)testing
C)virtualizing
D)acceleration
سؤال
Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.
سؤال
______ systems should not run automatic updates because they may possibly introduce instability.

A)Configuration controlled
B)Policy controlled
C)Change controlled
D)Process controlled
سؤال
_______ systems should validate all patches on test systems before deploying them to production systems.
سؤال
The range of logging data acquired should be determined _______.

A)during security testing
B)as a final step
C)after monitoring average data flow volume
D)during the system planning stage
سؤال
______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.
سؤال
The final step in the process of initially securing the base operating system is ________.
سؤال
The most important changes needed to improve system security are to ______.

A)disable remotely accessible services that are not required
B)ensure that applications and services that are needed are appropriately configured
C)disable services and applications that are not required
D)all of the above
سؤال
The three operating system security layers are: physical hardware,operating system kernel,and _________.
سؤال
______ is a reactive control that can only inform you about bad things that have already happened.
سؤال
Security concerns that result from the use of virtualized systems include ______.

A)guest OS isolation
B)guest OS monitoring by the hypervisor
C)virtualized environment security
D)all of the above
سؤال
_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
سؤال
The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
سؤال
The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

A)logging
B)backup
C)hardening
D)archive
سؤال
______ are resources that should be used as part of the system security planning process.

A)Texts
B)Online resources
C)Specific system hardening guides
D)All of the above
سؤال
Unix and Linux systems grant access permissions for each resource using the ______ command.
سؤال
System security begins with the installation of the ________.
سؤال
The needs and policy relating to backup and archive should be determined ______.

A)as a final step
B)during the system planning stage
C)during security testing
D)after recording average data flow volume
سؤال
Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.

A)complete
B)no longer a concern
C)continuous
D)sporadic
سؤال
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

A)archive
B)virtualization
C)patching
D)backup
سؤال
______ virtualization systems are typically seen in servers,with the goal of improving the execution efficiency of the hardware.
سؤال
______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.
سؤال
Guest OSs are managed by a ______,or VMM,that coordinates access between each of the guests and the actual physical hardware resources.
سؤال
Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.
سؤال
________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Operating System Security
1
It is possible for a system to be compromised during the installation
process.
True
2
Backup and archive processes are often linked and managed together.
True
3
The purpose of the system does not need to be taken into consideration
during the system security planning process.
False
4
The first step in deploying new systems is _________.

A)security testing
B)installing patches
C)planning
D)secure critical content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Manual analysis of logs is a reliable means of detecting adverse
events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
The first critical step in securing a system is to secure the __________.

A)base operating system
B)system administrator
C)malware protection mechanisms
D)remote access privileges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
You should run automatic updates on change-controlled systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Lower layer security does not impact upper layers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
A plan needs to identify appropriate personnel to install and manage
the system,noting any training needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.

A)Virtualizing
B)White listing
C)Logging
D)Patching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Most large software systems do not have security weaknesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
The following steps should be used to secure an operating system:

A)test the security of the basic operating system
B)remove unnecessary services
C)install and patch the operating system
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Each layer of code needs appropriate hardening measures in place to
provide appropriate security services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
A very common configuration fault seen with Web and file transfer
servers is for all the files supplied by the service to be owned by the
same "user" account that the server executes as.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Ideally new systems should be constructed on an unprotected network
in order to prevent installation restrictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Passwords installed by default are secure and do not need to be
changed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following need to be taken into consideration during the system security planning process?

A)how users are authenticated
B)the categories of users of the system
C)what access the system has to information stored on other hosts
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
The default configuration for many operating systems usually
maximizes security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Performing regular backups of data on a system is a critical control
that assists with maintaining the integrity of the system and user data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
A malicious driver can potentially bypass many security controls to
install malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cryptographic file systems are another use of _______.

A)encryption
B)testing
C)virtualizing
D)acceleration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
Unix and Linux systems use a ________ which restricts the server's view of the file system to just a specified portion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
______ systems should not run automatic updates because they may possibly introduce instability.

A)Configuration controlled
B)Policy controlled
C)Change controlled
D)Process controlled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
_______ systems should validate all patches on test systems before deploying them to production systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The range of logging data acquired should be determined _______.

A)during security testing
B)as a final step
C)after monitoring average data flow volume
D)during the system planning stage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
______ is the process of retaining copies of data over extended periods of time,being months or years,in order to meet legal and operational requirements to access past data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
The final step in the process of initially securing the base operating system is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The most important changes needed to improve system security are to ______.

A)disable remotely accessible services that are not required
B)ensure that applications and services that are needed are appropriately configured
C)disable services and applications that are not required
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
The three operating system security layers are: physical hardware,operating system kernel,and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
______ is a reactive control that can only inform you about bad things that have already happened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
Security concerns that result from the use of virtualized systems include ______.

A)guest OS isolation
B)guest OS monitoring by the hypervisor
C)virtualized environment security
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
_______ is the process of making copies of data at regular intervals allowing the recovery of lost or corrupted data over relatively short time periods of a few hours to some weeks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The aim of the specific system installation planning process is to maximize _______ while minimizing costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ______ process makes copies of data at regular intervals for recovery of lost or corrupted data over short time periods.

A)logging
B)backup
C)hardening
D)archive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
______ are resources that should be used as part of the system security planning process.

A)Texts
B)Online resources
C)Specific system hardening guides
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
Unix and Linux systems grant access permissions for each resource using the ______ command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
System security begins with the installation of the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The needs and policy relating to backup and archive should be determined ______.

A)as a final step
B)during the system planning stage
C)during security testing
D)after recording average data flow volume
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
Once the system is appropriately built,secured,and deployed,the process of maintaining security is ________.

A)complete
B)no longer a concern
C)continuous
D)sporadic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

A)archive
B)virtualization
C)patching
D)backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
______ virtualization systems are typically seen in servers,with the goal of improving the execution efficiency of the hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
______ virtualization systems are more common in clients,where they run along side other applications on the host OS,and are used to support applications for alternate operating system versions or types.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
Guest OSs are managed by a ______,or VMM,that coordinates access between each of the guests and the actual physical hardware resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Configuration information in Windows systems is centralized in the _______,which forms a database of keys and values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
________ refers to a technology that provides an abstraction of the computing resources that run in a simulated environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.