Answered step by step
Verified Expert Solution
Question
1 Approved Answer
What is the process of making an operating system secure from attack called? a . Hardening b . Tuning b . Sealing d . Locking
What is the process of making an operating system secure from attack called?
a Hardening
b Tuning
b Sealing
d Locking down
What type of program exists primarily to propagate and spread itself to other systems and
can do so without interaction from users?
a Virus
b Trojan horse
c Logic bomb
d Worm
Which algorithm is an asymmetric encryption protocol?
a RSA
b AES
c DES
dDES
What is the process of investigating a computer system for information relating to a security
incident?
a Computer forensics
b Virus scanning
c Security policy
d Evidence gathering
Which of the following is seen as a replacement for protocols such as Telnet and FTP
a
b SCP
c Telnet
d SSH
What are worms typically known for?
a Rapid replication
b Configuration changes
c Identity theft
d DDoS
What is the most common sign of a DoS attack?
a Weird messages
b Rebooting of a system
c Slow performance
d Stolen credentials
The integrity component provides which feature of the CIA triad?
a Verification that information is accurate
b Verification that ethics are properly maintained
c Establishment of clear access control of data
d Verification that data is kept private and secure
Which statement defines malware most accurately?
a Malware is a form of virus.
b Malware is a form of trojans.
c Malware covers all malicious software.
d Malware only covers spyware.
Which of the following is a characteristic of anomalybased IDS?
a It compares network traffic against a database of known attack patterns
b It learns normal behavior and flags deviations from it
c It monitors only specific network segments
d It operates solely at the host level
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started