OS Hardening SEC340 Chapter 14

25 July 2022
4.7 (114 reviews)
10 test answers

Unlock all answers in this set

Unlock answers (6)
question
How much space is typically needed to store IDPS data? Select one: a. a gigabyte or more b. at least a terabyte c. a megabyte or two d. a few hundred Kilobytes
answer
a. a gigabyte or more
question
The process of testing a network defense system is referred to as which of the following? Select one: a. IDPS evaluation b. security auditing c. distributed data collection d. change management
answer
b. security auditing
question
What approach to security calls for security through a variety of defensive techniques that work together? Select one: a. DOA b. DiD c. WoL d. PoE
answer
b. DiD
question
What should an outside auditing firm be asked to sign before conducting a security audit? Select one: a. search and seizure contract b. social engineering covenant c. nondisclosure agreement d. subpoena
answer
c. nondisclosure agreement
question
Which aspect of strengthening the performance of IDPS may involve degaussing? Select one: a. managing storage b. managing memory c. managing processors d. managing bandwidth
answer
a. managing storage
question
Which of the following is a benefit of using centralized data collection to manage sensor data? Select one: a. must use a VPN to transport data b. less network traffic c. less administrative time d. data stays on the local network
answer
c. less administrative time
question
Which of the following is a security-related reason for monitoring and evaluating network traffic? Select one: a. to optimize your router and switch protocols b. to determine if your IDPS signatures are working well c. to see how many files employees download form the Internet d. to create substantial data to analyze
answer
to determine if your IDPS signatures are working well
question
Which of the following is NOT a type of event that you would normally monitor? Select one: a. user account creation b. access to shared folders c. e-mail attachment handling d. antivirus scanning
answer
b. access to shared folders
question
Which of the following is NOT typically an aspect of a security event management program? Select one: a. monitoring events b. managing IDPS firmware c. managing change d. managing data from sensors
answer
b. managing IDPS firmware
question
Which type of change does NOT typically require the use of change management procedures? Select one: a. changes to ACLs b. new VPN gateways c. changing a manager's permissions to a file d. new password systems or procedures
answer
c. changing a manager's permissions to a file