Guide To Operating Systems Security
Guide To Operating Systems Security
Chapter 1 Solutions
Answers to the Chapter 1 Review Questions
1. What type of port might be involved in a port-scanning attack?
Answer: b. TCP
2. Which of the following operating systems enable you to configure a firewall? (Choose all that apply.)
3. Failing to configure an operating system to require that passwords be changed regularly is an example of which of
the following?
4. Which of the following are examples of wireless security measures? (Choose all that apply.)
Answer: b. kernel
6. Your server operators believe that someone has attempted to remotely access one of the Windows 2003 servers in
the computer room. Which of the following might you do? (Choose all that apply.)
8. You have received an e-mail from a friend that contains a forwarded message warning of a virus in a file that is
found in the operating system folder of your computer. If it does not truly contain a virus then this is a example of
________________________________?
9. Which of the following are common security options in a computer's BIOS? (Choose all that apply.)
Answer: a. and c.
10. The components of an operating system that manage computer memory and use of the CPU are the
______________________________.
11. Ganda is an example of which of the following? (Choose all that apply.)
Answer: b. and c.
12. A denial of service attack might be intended to stop which of the following communications services? (Choose
all that apply.)
Answer: a. and b.
13. The ___________________________ started the Global Information Assurance Certification Program
Answer: b. kill 2
15. A __________________________ attack is one type of attack that has been used to go through a network
address translation device
16. Your organization has a problem in that many users employ short passwords between two and four letters long.
What can you do to address this security risk? (Choose all that apply.)
17. Which operating system security measure enables you to protect data in the event of a destructive virus or a
damaged spot on a disk drive.
Answer: c. backups
19. Which of the following are examples of port scanning programs? (Choose all that apply.)
Answer: c. and d.
20. A ___________________ creates new files rather than infecting existing files.
Answer: a. worm