StudyBlue printing of IS418 Final Study Guide
IS418 Final Study Guide
Dorothy BowersO'Dell Fri Apr 12 14:22:11 CDT 2013
Which method is preferable for securing access in the Remote Domain?
1. SSH
2. Telnet
3. FTP
4. NFS
1. SSH
Which following laws ensures that all USbased financial institiutions protect presonal financial information for their clients?
1. HIPAA
2. SOX
3. GLBA
4. PCI DSS
3. GLBA
What will be the impact of changing the GRUB option timeout=5 to timeout=0 on the Linux operating system?
1. The boot loader will immedeately boot the OS into the Default Kernel
2. The system will display "kernel panic" error.
3. All TCP/IP connections will timeout immedeately.
4. This will have no impact on the Linux OS.
1. The boot loader will immedeately boot the OS into the Default Kernel
Which of the following is a difference between security vulnerabilities associated with open sources software and proprietary softwrae? 1. Vulerabilities in proprietary software are immediately known and fixed.
2. Open source SW vulenrabilities can take months to fix because most people working on it are volunteers.
3. There are more resources for testing proprietary SW. Therefore, Vulnerabilities are not an issue with Propietary SW.
4. Typically, open source software vulnerabilities are immedeately made pubic.
4. Typically open source software vulnerabilities are immedeately made public.
What are the advantages of virtualization in a Linux infrastructure?
1. cost savings by purchasing less hardware.
2. Cost savings by using less power.
3. Security advatantages with more bastion hosts.
4. Only 1 and 2 are correct
5. Only 2 and 3 are correct
6. Only 1 and 3 are correct
7. 1, 2 and 3 are correct
1 and 3
What is one of the best descriptions of OSSTMM?
1. A methodology to develop open source software. https://www.studyblue.com/printFlashcardDeck?deckId=6270814¬e=true 1/8
5/28/2015
StudyBlue printing of IS418 Final Study Guide
2. .....