Computer Science > QUESTIONS & ANSWERS > Netsec ex 3, Questions with accurate answers, 2022/2023. Graded A. (All)
Netsec ex 3, Questions with accurate answers, 2022/2023. Graded A. 1) Any device with an IP address is a ________. A) server B) host C) client D) None of the above - ✔?B Diff: 1 Questi ... on: 1a 2) Any device with an IP address is a host. - ✔?TRUE Diff: 1 Question: 1a 3) When you use your mobile firm to surf the Internet, it is a host. - ✔?TRUE Diff: 1 Question: 1a 4) ________ is necessary to protect the host against attacks. A) Host hardening B) Host bulwarking C) Host shielding D) None of the above - ✔?A Diff: 1 Question: 1b 5) If an attacker takes over a firewall, he or she will be able to ________. A) allow connection-opening requests that violate policy B) reroute internal data to alternate paths C) provide the false sense that the firewall is still working correctly D) All of the above - ✔?D Diff: 3 Question: 1d 6) If an attacker takes over a router, he or she will be able to ________. A) map the entire internal network B) reroute traffic to cause a local DoS C) Both A and B D) Neither A nor B - ✔?B Diff: 3 Question: 1e 7) Which of the following are elements of host hardening? A) Encrypting data on the host B) Read operating system log files C) Both A and B D) Neither A nor B - ✔?C Diff: 2 Question: 1f 8) Which of the following are elements of host hardening? A) Minimizing applications on the host B) Having a good border firewall C) Both A and B D) Neither A nor B - ✔?A Diff: 2 Question: 1f 9) A company should not replace default passwords during configuration. - ✔?FALSE Diff: 1 Question: 1g 10) ________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type. A) Processes B) Security baselines C) Procedures D) None of the above - ✔?B Diff: 2 Question: 1h 11) A systems administrator may manage ________. A) an individual host B) a group of hosts C) Both A and B D) Neither A nor B - ✔?C Diff: 1 Question: 1j 12) Systems administrators manage individual hosts but not groups of hosts. - ✔?FALSE Diff: 1 Question: 1j 13) Systems administrators generally do not manage the network. - ✔?TRUE Diff: 1 Question: 1k 14) Microsoft's server operating system is called ________. A) UNIX B) Windows Server C) Both A and B D) Neither A nor B - ✔?B Diff: 1 Question: 2a 15) Which of the following security protections are provided by recent version of Windows Server? A) Server software firewalls B) The ability to encrypt data C) Both A and B D) Neither A nor B - ✔?C Diff: 1 Question: 2b 16) The Microsoft Windows Server interface looks like the interface in ________. A) client versions of Microsoft Windows B) UNIX C) Both A and B D) Neither A nor B - ✔?A Diff: 2 Question: 2c 17) MMCs are administrative used to manage ________ servers. A) Apple B) Microsoft C) UNIX D) All of the above - ✔?B Diff: 1 Question: 2d 18) In MMCs, the tree pane lists ________. A) objects on which actions can be taken B) actions that can be taken on the selected object C) Both A and B D) Neither A nor B - ✔?A Diff: 2 Question: 2f 19) A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily. A) snap-in B) management application C) administrative application D) Action - ✔?A Diff: 1 Question: 2g 20) Which of the following statements is not an accurate description of MMCs? A) MMCs are produced by Microsoft. B) MMCs are located under the Start / Management menu choice. C) MMCs use GUIs. D) MMCs are relatively easy to learn to use. - ✔?B Diff: 3 Question: 2j 21) Different UNIX versions have different security methods. - ✔?TRUE Diff: 1 Question: 3a 22) ________ is a family of operating systems that share interoperability at the kernel level. A) UNIX B) LINUX C) Both A and B D) Neither A nor B - ✔?A Diff: 1 Question: 3b 23) ________ is a version of ________ for PCs. A) LINUX, UNIX B) UNIX, LINUX C) Both A and B D) Neither A nor B - ✔?A Diff: 1 24) The core part of the LINUX operating system is called ________. A) the foundation B) UNIX C) GNU D) the kernel - ✔?D Diff: 1 Question: 3c 25) A LINUX distribution consists only of the LINUX kernel. - ✔?FALSE Diff: 1 Question: 3d 26) The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows. A) purchasing B) using C) Both A and B D) Neither A nor B - ✔?A Diff: 2 Question: 3e 27) A specific distribution of UNIX comes with multiple user interfaces. - ✔?TRUE Diff: 2 Question: 3f 28) UNIX command line interfaces are called ________. A) shells B) GUIs C) Both A and B D) Neither A nor B - ✔?A Diff: 1 Question: 3g 29) CLI shells use more system resources than GUIs. - ✔?FALSE Diff: 1 Question: 3h 30) CLIs usually are easier to learn than GUIs. - ✔?FALSE Diff: 1 Question: 3i 31) A(n) ________ is a security weakness that makes a program vulnerable to attack. A) attack vector B) exploit C) vulnerability D) All of the above - ✔?C Diff: 1 Question: 4a 32) A(n) ________ is a program that takes advantage of a(n) ________. A) exploit, vulnerability B) vulnerability, exploit C) Both A and B D) Neither A nor B - ✔?A Diff: 2 33) An attack that comes before fixes are released is called a vulnerability attack. - ✔?FALSE Diff: 1 Question: 4c 34) A(n) ________ is defined as an attack that comes before fixes are released. A) exploit B) zero-day attack C) worm D) anomaly attack - ✔?B Diff: 1 Question: 4c 35) Attackers frequently create exploits within hours or days after a fix is released by a vendor. - ✔?TRUE Diff: 2 Question: 4d 36) Which of the following is not a type of fix for vulnerabilities? A) Work-arounds B) Patches C) Version upgrades D) All of the above are types of fixes for vulnerabilities - ✔?D Diff: 2 Question: 5a 37) A ________ is a type of fix for vulnerabilities. A) work-around B) service pack C) Both A and B D) Neither A nor B - ✔?C Diff: 2 Question: 5a 38) What is the name for a small program that fixes a particular vulnerability? A) Work-around B) Patch C) Service pack D) Version upgrade - ✔?B Diff: 1 Question: 5b 39) A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability. - ✔?FALSE Diff: 1 Question: 5b 40) A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements. - ✔?TRUE Diff: 2 Question: 5c 41) It generally is a good idea from a security point of view to upgrade to a new version of an operating system. - ✔?TRUE Diff: 1 Question: 5d 42) Since Windows Server 2003, servers can be programmed to check for updates automatically. - ✔?TRUE Diff: 1 43) LINUX commonly uses the rpm method to download patches. - ✔?TRUE Diff: 1 Question: 6b 44) Software vendors typically release ________ patches per product in a typical year. A) many B) a few C) no - ✔?A Diff: 1 Question: 7a 45) Many firms prioritize patches because the cost of installing all patches it too high. - ✔?TRUE Diff: 1 Question: 7b 46) ________ can greatly reduce patching costs. A) Vulnerability management servers B) Manual downloads C) Patch management servers D) All of the above - ✔?C Diff: 1 Question: 7c 47) Vulnerability patches can result in a loss of functionality in the patched host. - ✔?TRUE Diff: 1 Question: 7d 48) Assigning security measures to groups is better than assigning security measures to individuals within groups because ________. A) applying security measures to groups takes less time than applying them individually B) applying security measures in groups reduces errors in assigning security settings C) Both A and B D) Neither A nor B - ✔?C Diff: 2 Question: 8 49) Assigning security measures to groups is ________ than assigning security measures to individuals within groups. A) cheaper B) less accurate C) Both A and B D) Neither A nor B - ✔?A Diff: 2 Question: 8 50) Assigning security measures to individuals within groups is cheaper than assigning security measures to groups. - ✔?FALSE Diff: 1 Question: 8 51) The Local Users and Groups snap-in is available on the ________ MMC. A) Computer Management B) Security C) Permissions D) Local Permissions - ✔?A Diff: 3 Question: 9b 52) The super user account has ________ control over the computer. A) total or nearly total B) substantial but not nearly total C) little D) no - ✔?A Diff: 1 Question: 10a 53) The super user account in Windows is called the ________. A) root B) Administrator C) MMC D) Super - ✔?B Diff: 1 Question: 10b 54) The super user account in UNIX is called ________. A) root B) administrator C) MMC D) kernel - ✔?A Diff: 1 Question: 10c [Show More]
Last updated: 3 years ago
Preview 1 out of 56 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 24, 2022
Number of pages
56
Written in
All
This document has been written for:
Uploaded
Sep 24, 2022
Downloads
0
Views
122
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·