Question: What is the process of making an operating system secure from attack called? a . Hardening b . Tuning b . Sealing d . Locking

What is the process of making an operating system secure from attack called?
a. Hardening
b. Tuning
b. Sealing
d. Locking down
What type of program exists primarily to propagate and spread itself to other systems and
can do so without interaction from users?
a. Virus
b. Trojan horse
c. Logic bomb
d. Worm
Which algorithm is an asymmetric encryption protocol?
a. RSA
b. AES
c. DES
d.3DES
What is the process of investigating a computer system for information relating to a security
incident?
a. Computer forensics
b. Virus scanning
c. Security policy
d. Evidence gathering
Which of the following is seen as a replacement for protocols such as Telnet and FTP?
a.SSL
b. SCP
c. Telnet2
d. SSH
What are worms typically known for?
a. Rapid replication
b. Configuration changes
c. Identity theft
d. DDoS
What is the most common sign of a DoS attack?
a. Weird messages
b. Rebooting of a system
c. Slow performance
d. Stolen credentials
The integrity component provides which feature of the CIA triad?
a. Verification that information is accurate
b. Verification that ethics are properly maintained
c. Establishment of clear access control of data
d. Verification that data is kept private and secure
Which statement defines malware most accurately?
a. Malware is a form of virus.
b. Malware is a form of trojans.
c. Malware covers all malicious software.
d. Malware only covers spyware.
Which of the following is a characteristic of anomaly-based IDS?
a. It compares network traffic against a database of known attack patterns
b. It learns normal behavior and flags deviations from it
c. It monitors only specific network segments
d. It operates solely at the host level
 What is the process of making an operating system secure from

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!