|
|
1. | What is the process of establishing a standard for security referred to as?
|
|
2. | What is the process of improving security in a NOS referred to as?
|
|
3. | What is the method of establishing a protocol connection to a controller called?
|
|
4. | Which of the following protocols should not be bound to TCP/IP if at all possible?
|
|
5. | What tool is used in Windows NT to monitor systems logs?
|
|
6. | Which of the following operating systems is an open source product?
|
|
7. | Which file system was primarily intended for desktop system use and offers limited security?
|
|
8. | Which file system is used in NetWare servers?
|
|
9. | Which file system allows remote mounting of file systems?
|
|
10. | What is the process of bundling one or more system fixes into a single package called?
|
|
11. | Which of the following statements is not true?
|
|
12. | What is the process of applying a repair to an operating system while the system stays in operations called?
|
|
13. | What is the process of applying manual changes to a program called?
|
|
14. | Which of the following best describes an ACL?
|
|
15. | What product verifies that files being received by an SMTP server contain no suspicious code?
|
|
16. | What is one of the primary ways in which an attacker uses DNS?
|
|
17. | LDAP is an example of which of the following?
|
|
18. | What is the primary database used in applications today?
|
|
19. | The flexibility of relational databases in use today is a result of which of the following?
|
|
20. | Which model is used to provide an intermediary server between the end user and the database?
|
|
Answers
1. | A. Common Criteria is a standard adopted internationally for computer security. The recommended level for commercial systems is EAL 4. |
2. | B. Hardening is the process of improving the security of an operating system or application. One of the primary methods of hardening an operating system is to eliminate unneeded protocols. |
3. | C. Binding is the process of associating one protocol with another protocol or to a network card. |
4. | C. NetBIOS should not be bound to TCP/IP if at all possible. NetBIOS is a well-established target of attackers. |
5. | A. Event Viewer is the primary tool used to monitor systems event in Windows NT. |
6. | C. The open source movement makes system source code available to developers and programmers. |
7. | C. FAT technology was originally intended for DOSdesktop systems. This file system offers limited security options. |
8. | A. NSS is Novell's newest file system. NSS is a proprietary environment for servers. |
9. | D. Network File Systems (NFS) is the UNIX standard for remote file systems. |
10. | A. A service pack is one or more repairs to system problems bundled into a single process or function. |
11. | B. Never share the root directory of a disk if at all possible. This opens the entire disk to potential exploitation. |
12. | C. A hotfix is done while a system is operating. This reduces the necessity to take a system out of service to fix a problem. |
13. | C. A patch is a temporary workaround of a bug or problem in code that is applied manually. Patches are usually replaced by complete programs at a later date. |
14. | A. Access Control Lists allow individual and highly controllable access to resources in a network. An ACL can also be used to exclude a particular system, IP address, or user. |
15. | A. SMTP is the primary protocol used in e-mail. An SMTP virus scanner would check all incoming and outgoing e-mails for suspicious code. If a file is potentially infected, the scanner notifies the originator and quarantines the file. |
16. | A. DNS records in a DNS server provide insights into the nature and structure of a network. DNS records should be kept to a minimum in public DNS servers. |
17. | A. Lightweight Directory Access Protocol (LDAP) is a directory access protocol used to publish information about users. This is the computer equivalent of a phone book. |
18. | B. Relational database systems are the most frequently installed database environments in use today. |
19. | A. SQL is a very powerful database access language used by most relational database systems. |
20. | C. A three-tiered model puts a server between the client and the database. |
|
|