Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What is the process of making an operating system secure from attack called? a . Hardening b . Tuning b . Sealing d . Locking

What is the process of making an operating system secure from attack called?
a. Hardening
b. Tuning
b. Sealing
d. Locking down
What type of program exists primarily to propagate and spread itself to other systems and
can do so without interaction from users?
a. Virus
b. Trojan horse
c. Logic bomb
d. Worm
Which algorithm is an asymmetric encryption protocol?
a. RSA
b. AES
c. DES
d.3DES
What is the process of investigating a computer system for information relating to a security
incident?
a. Computer forensics
b. Virus scanning
c. Security policy
d. Evidence gathering
Which of the following is seen as a replacement for protocols such as Telnet and FTP?
a.SSL
b. SCP
c. Telnet2
d. SSH
What are worms typically known for?
a. Rapid replication
b. Configuration changes
c. Identity theft
d. DDoS
What is the most common sign of a DoS attack?
a. Weird messages
b. Rebooting of a system
c. Slow performance
d. Stolen credentials
The integrity component provides which feature of the CIA triad?
a. Verification that information is accurate
b. Verification that ethics are properly maintained
c. Establishment of clear access control of data
d. Verification that data is kept private and secure
Which statement defines malware most accurately?
a. Malware is a form of virus.
b. Malware is a form of trojans.
c. Malware covers all malicious software.
d. Malware only covers spyware.
Which of the following is a characteristic of anomaly-based IDS?
a. It compares network traffic against a database of known attack patterns
b. It learns normal behavior and flags deviations from it
c. It monitors only specific network segments
d. It operates solely at the host level
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What sector and functional experience are we looking for?

Answered: 1 week ago