Preview

Chapter 2 Assessment

Satisfactory Essays
Open Document
Open Document
264 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 2 Assessment
1) Which of the following is not a goal of a secure environment? C) All required information is available to users.
2) Which term describes the central component of an operating system? A) Kernel
3) What are the two run modes for Windows programs? D) Kernel mode and user mode
4) Which of the following Windows components resides in memory to provide the core operating system services? B) Microkernel
5) What is the name of the process which proves you are who you say you are? D) Authentication
6) Which type of authentication is a smart card? B) Type II
7) Which access control method relates data classification to user clearance? A) MAC
8) What value uniquely identifies a user or group in Windows? C) SID
9) If the same user is created on three separate Windows computers, which value is the same on all three computers? C) Username
10) Which Windows feature allows users and groups to be “shared” among machines? D) Active Directory
11) What defines the limit of how many computers share users and groups? C) Domain
12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.
13) When possible, what is the best way to mitigate vulnerability in a specific service? A) Remove the service
14) When monitoring a Windows system, with what do you compare current system performance to test for security compliance? C) A stated baseline
15) Why should you immediately test your system for security compliance after making a configuration change? C) Configuration changes may introduce new vulnerabilities.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    CHAPTER3 REVEIW

    • 527 Words
    • 3 Pages

    4. Which of the following answers are true about random-access memory as it is normally used inside a personal computer (2 answers)…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.)…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mr Ramos ITSC 1405 CHAP 1

    • 1157 Words
    • 4 Pages

    3. The impact of the evolution of computer hardware and the accompanying evolution of operating system software is as follow: As experience with a combination of hardware and software matures; users and engineers gain new visions of what they would like to do next. New hardware is usually paralleled by operating system and system software development. The fielding of new systems results in user and operator feedback that leads to operating system and system software improvement. Innovative users try equipment and software for applications not envisioned by the hardware and software vendors. Successes lead to additional sales and use, which leads to further supporting software development. If there is perceived economic benefit, the hardware vendor will seek ways to adapt to the new needs without necessarily sacrificing basic capabilities. Often this consists of creating a more efficient interface.…

    • 1157 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    d. The draw backs to this system are that it is prone to attacks. We would have to run Anti virus programs to avoid any…

    • 641 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Network Security

    • 678 Words
    • 3 Pages

    a. Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    6. The windows shell operates in user mode and the kernel operates in kernel mode.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    5. In a typical information security program, what is the primary responsibility of information (data) owner?…

    • 10293 Words
    • 42 Pages
    Powerful Essays
  • Good Essays

    zxczxczxczzczxcz

    • 511 Words
    • 2 Pages

    Examine three (3) common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.…

    • 511 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    56. A business is concerned that computers are susceptible to malware infection. Which two actions will help solve this problem? (Choose two.) 16.5.2…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer Mcq

    • 655 Words
    • 3 Pages

    Q2- The programs which are as permanent as hardware and stored in ROM is known as-…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Fix Open Vulnerabilities –These vulnerabilities are in operating systems, applications, web browsers, and virtualized platforms. If you can stay on top of the vulnerabilities that are critical to your organization then you can mitigate a lot of the risk of outside attackers targeting insiders.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Thesis

    • 342 Words
    • 2 Pages

    3. What is the perception of the respondents on their responsibilities as part of security industry?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays

Related Topics