osp 1 (Correctly answered)
d correct answers 1. What is a difference between security vulnerabilities associated with open source software and proprietary software? a. Vulnerabilities in propriety software are immediately known and fixed. b. Open source software vulnerabilities can take months to fix because most people working on the software are volunteers. c. There are more resources for testing proprietary software. Therefore, vulnerabilities are usually not an issue with proprietary software. d. Typically, open source software vulnerabilities are immediately made public. c correct answers 2. Which of the following laws ensure that all U.S.-based financial institutions protect personal financial information of their clients? a. HIPAA b. SOX c. GLBA d. PCI DSS a correct answers 3. Which method is preferable for securing access in the Remote Access Domain? a. SSH b. Telnet c. FTP d. NFS c correct answers 4. What are the advantages of virtualization in a Linux infrastructure? 1. Cost savings by purchasing less hardware 2. Cost savings by using less power 3. Security advantages with more bastion hosts a. Only 1 and 2 are correct b. Only 2 and 3 are correct c. Only 1 and 3 are correct d. 1, 2, and 3 are correct b correct answers 5. Which of the following is one of the best descriptions for OSSTMM? a. A methodology to develop open source software b. A methodology used by open source security professionals to measure compliance c. A methodology to automate penetration tests on open source software d. A methodology to ensure that no open source systems can be compromised c correct answers 6. Who developed the first Linux kernel? a. Andrew S. Tannenbaum b. Bill Gates c. Linus Torvalds
Written for
- Institution
- Osp
- Course
- Osp
Document information
- Uploaded on
- July 13, 2023
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
d