Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Operating Systems Security
Quiz 1: Operating Systems Security: Keeping Computers and Networks Secure
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
What type of attack occurs when the computer originating the attack causes several other computers to send attack packets?
Question 22
Multiple Choice
Which of the following information about us should be kept private?
Question 23
Multiple Choice
One WAN is composed of two or more LANs or MANs that are connected across a distance of more than approximately _____ miles.
Question 24
Multiple Choice
The traceroute troubleshooting utility can be used by which of the following operating systems?
Question 25
Multiple Choice
_____ can translate an IP address from a private network to a different address used on a public network or the Internet.
Question 26
Multiple Choice
Which of the following is part of the total cost of ownership of a computer network?
Question 27
Multiple Choice
Most of the first computer networks transmitted data over _____.
Question 28
Multiple Choice
A _ ____ is software or hardware placed between two or more networks that selectively allows or denies access.
Question 29
Multiple Choice
Operating system and network security is the ability to do which of the following reliably to information?
Question 30
Multiple Choice
According to a recent survey performed by the CSI, what percentage of computer security professionals have reported security breaches in their systems?
Question 31
Multiple Choice
What type of attack has occurred when a logged-on computer is used when that person is not present?
Question 32
Multiple Choice
Statistics from the CSI suggest that the number of people working as computer security professionals has been increasing by _____ percent a year since 1998.
Question 33
Multiple Choice
A _____ attack is used to interfere with normal access to a network host, Web site, or service, by flooding a network with useless information or with frames or packets containing errors that are not identified by a particular network service.
Question 34
Multiple Choice
Which of the following is a reason for the failure to fully use the security features of an operating system or network?
Question 35
Multiple Choice
The _____ translates information from the kernel and device drivers so the application can use it.
Question 36
Multiple Choice
Which of the following is a cost of deploying security within an organization?
Question 37
Multiple Choice
At a minimum, how many groups does training involve within an organization?
Question 38
Multiple Choice
What type of attack has occurred when an attacker gains access to a computer through the use of a hidden program?
Question 39
Multiple Choice
_____ consists of a chain of activities that is necessary to complete a task, such as filling out and transmitting forms, entering data, updating databases, and creating new files.