Info
Warning
Danger
/ Homework Answers / Computer Science / 1. The first rule of computer security to check ___________. a.

Question

 

1. The first rule of computer security is to check ___________.

a. Patches

b. Ports

c. Policies

d. None of the above

2. Any _________ you do not explicitly need should be shut down.

a. Patches

b. Ports

c. Policies

d. Probes

3. For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.

a. Patch

b. Router

c. Probe

d. None of the above

4. Firestarter, Norton, McAfee, and Outpost are examples of __________.

a. Routers

b. Virus scanners

c. Firewalls

d. Operating systems

5. A password policy for a 90- or 180-day replacement schedule is called password ________.

a. History

b. Age

c. Uniqueness

d. None of the above

6. You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.

a. Minimum password age

b. Maximum password age

c. Minimum password length

d. Maximum password length

7. A good password has at least ______ characters.

a. 6

b. 8

c. 10

d. 15

8. Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.

a. Once

b. Twice

c. Three times

d. None of the above

9. Projectors, CD burners, and laptops are examples of _________.

a. Servers

b. Workstations

c. Routers

d. Miscellaneous equipment

10. The process to secure a computer system against hackers, malware, and other intruders is referred to as _____________.

a. Securitizing

b. Hardening

c. Routing

d. None of the above

11. Computers called __________ provide databases, websites, and print functionality.

a. Workstations

b. Servers

c. Routers

d. Firewalls

12. On a server, you should create your own accounts with ________ that do not reflect their level of permission.

a. Names

b. Numbers

c. Passwords

d. None of the above

13. _________ is a scanning tool that returns a report stating the weaknesses in your Registry settings.

a. Scandisk

b. Regedit

c. Cerberus

d. None of the above

14. A _________ involves setting up two firewalls: an outer and an inner firewall.

a. DMZ (demilitarized zone)

b. proxy server

c. DNS server

d. None of the above

15.  The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

a. Servers

b. Workstations

c. Routers

d. Web servers

 

 

Solution
5 (1 Ratings )

Solved
Computer Science 1 Month Ago 19 Views
This Question has Been Answered!
Premium Content -

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16272 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!