0% found this document useful (0 votes)
646 views

Guide To Operating Systems Security

This document provides answers to 20 review questions about operating system security from Chapter 1 of a guide. The answers cover topics like types of ports involved in attacks, configuring firewalls and passwords, wireless security measures, the operating system kernel, investigating remote access attempts, reasons for port scanning, virus hoaxes, BIOS security options, examples of attacks, addressing short passwords, data backups, remote access security, port scanning programs, and worms.

Uploaded by

shashahayes
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
646 views

Guide To Operating Systems Security

This document provides answers to 20 review questions about operating system security from Chapter 1 of a guide. The answers cover topics like types of ports involved in attacks, configuring firewalls and passwords, wireless security measures, the operating system kernel, investigating remote access attempts, reasons for port scanning, virus hoaxes, BIOS security options, examples of attacks, addressing short passwords, data backups, remote access security, port scanning programs, and worms.

Uploaded by

shashahayes
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Guide to Operating Systems Security

Chapter 1 Solutions
Answers to the Chapter 1 Review Questions
1. What type of port might be involved in a port-scanning attack?

Answer: b. TCP

2. Which of the following operating systems enable you to configure a firewall? (Choose all that apply.)

Answer: a., b., c., and d.

3. Failing to configure an operating system to require that passwords be changed regularly is an example of which of
the following?

Answer: a. human factor

4. Which of the following are examples of wireless security measures? (Choose all that apply.)

Answer: c. 802.1x security

5. The core code of an operating system is the operating system _____________________.

Answer: b. kernel

6. Your server operators believe that someone has attempted to remotely access one of the Windows 2003 servers in
the computer room. Which of the following might you do? (Choose all that apply.)

Answer: a., c., and d.

7. One reason why an attacker scans ports is to ________________________________.

Answer: c. access an open or unused service

8. You have received an e-mail from a friend that contains a forwarded message warning of a virus in a file that is
found in the operating system folder of your computer. If it does not truly contain a virus then this is a example of
________________________________?

Answer: d. a virus hoax

9. Which of the following are common security options in a computer's BIOS? (Choose all that apply.)

Answer: a. and c.

10. The components of an operating system that manage computer memory and use of the CPU are the
______________________________.

Answer: d. resource managers

11. Ganda is an example of which of the following? (Choose all that apply.)

Answer: b. and c.

12. A denial of service attack might be intended to stop which of the following communications services? (Choose
all that apply.)
Answer: a. and b.

13. The ___________________________ started the Global Information Assurance Certification Program

Answer: a. SANS Institute

14. The ___________________ command in Linux is used to stop a process.

Answer: b. kill 2

15. A __________________________ attack is one type of attack that has been used to go through a network
address translation device

Answer: d. source routing

16. Your organization has a problem in that many users employ short passwords between two and four letters long.
What can you do to address this security risk? (Choose all that apply.)

Answer: a., c., and d.

17. Which operating system security measure enables you to protect data in the event of a destructive virus or a
damaged spot on a disk drive.

Answer: c. backups

18. Call-back is an example of ___________________________ security.

Answer: d. remote access

19. Which of the following are examples of port scanning programs? (Choose all that apply.)

Answer: c. and d.

20. A ___________________ creates new files rather than infecting existing files.

Answer: a. worm

You might also like