100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
04-04-2025
Written in
2024/2025

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+ host - Answers any device with an IP address host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting physical access, install secure configuration options, minimize number of apps and OS services running on the host) back up - Answers host hardening, without this nothing else matters: physical access - Answers host hardening; restrict _______________________ ____________ to the host secure configuration options - Answers host hardening; install the operating system in a manner that ensures default passwords are replaced with strong passwords applications, services - Answers host hardening; minimize the number of ______________ and operating system ___________ that run on the host to reduce the ability of hackers to take over the host. some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities; hackers can take them over very quickly - Answers the problems that require servers and host to be hardened servers, clients, routers - Answers common hosts applications - Answers harden all ____________ on the host patches - Answers download and install _________ for known operating system vulnerabilities users, groups - Answers manage _________ and _____________ permissions - Answers manage access ____________ for users and groups separately encrypt - Answers _______________ data if appropriate firewall - Answers add a host _________________ logs - Answers read operating system ____________ regularly to look for suspicious activities vulnerability tests - Answers run ______________________ against the system regularly to identify security weaknesses that were not caught in the normal course of installation or operation security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type disk images - Answers full copies of installations disk images - Answers saves money on computer installations and ensures each server is properly configured to the firm's security baselines and general security policies security baselines - Answers specifications for how hardening should be done systems administrators - Answers server administrators are called implement security baseline actions - Answers systems adminstrators uniformity in hardening - Answers security baselines help to ensure network administration - Answers systems administrators are not usually responsible for virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization virtualization - Answers allows multiple operating systems with their associated applications and data to run independently on a single physical machine virtual machines - Answers run their own operating system and share local system resources allows systems administrators to create a single security baseline for each server (or remote client) within the organization; minimizes chances of incorrect configurations; eliminates need to install applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of virtualization systems administrators - Answers IT employees who manage individual hosts or groups of hosts cloud computing - Answers uses processing power, applications, data storage and other services over the internet software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and its associated data are hosted in the cloud and accessed using a web browser thin clients - Answers essentially a screen, keyboard and connection to the mainframe mainframe - Answers where all application processing occurs and data is stored stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers) reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers advantages of cloud computing include using a third party service provider, trust, compliance - Answers corporations have b

Show more Read less
Institution
Corporate Computer Security
Course
Corporate Computer Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Corporate Computer Security
Course
Corporate Computer Security

Document information

Uploaded on
April 4, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

host - Answers any device with an IP address

host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting
physical access, install secure configuration options, minimize number of apps and OS services running
on the host)

back up - Answers host hardening, without this nothing else matters:

physical access - Answers host hardening; restrict _______________________ ____________ to the
host

secure configuration options - Answers host hardening; install the operating system in a manner that
ensures default passwords are replaced with strong passwords

applications, services - Answers host hardening; minimize the number of ______________ and
operating system ___________ that run on the host to reduce the ability of hackers to take over the
host.

some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities;
hackers can take them over very quickly - Answers the problems that require servers and host to be
hardened

servers, clients, routers - Answers common hosts

applications - Answers harden all ____________ on the host

patches - Answers download and install _________ for known operating system vulnerabilities

users, groups - Answers manage _________ and _____________

permissions - Answers manage access ____________ for users and groups separately

encrypt - Answers _______________ data if appropriate

firewall - Answers add a host _________________

logs - Answers read operating system ____________ regularly to look for suspicious activities

vulnerability tests - Answers run ______________________ against the system regularly to identify
security weaknesses that were not caught in the normal course of installation or operation

security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type
and of particular versions within each type

disk images - Answers full copies of installations

, disk images - Answers saves money on computer installations and ensures each server is properly
configured to the firm's security baselines and general security policies

security baselines - Answers specifications for how hardening should be done

systems administrators - Answers server administrators are called

implement security baseline actions - Answers systems adminstrators

uniformity in hardening - Answers security baselines help to ensure

network administration - Answers systems administrators are not usually responsible for

virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization

virtualization - Answers allows multiple operating systems with their associated applications and data to
run independently on a single physical machine

virtual machines - Answers run their own operating system and share local system resources

allows systems administrators to create a single security baseline for each server (or remote client)
within the organization; minimizes chances of incorrect configurations; eliminates need to install
applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of
virtualization

systems administrators - Answers IT employees who manage individual hosts or groups of hosts

cloud computing - Answers uses processing power, applications, data storage and other services over
the internet

software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and
its associated data are hosted in the cloud and accessed using a web browser

thin clients - Answers essentially a screen, keyboard and connection to the mainframe

mainframe - Answers where all application processing occurs and data is stored

stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers)

reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers
advantages of cloud computing include

using a third party service provider, trust, compliance - Answers corporations have been slow to adopt
cloud computing because

Windows Server - Answers Microsoft's server operating system, security has improved over time
(firewalls, encryption, minimize number of running applications, etc.)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
359
Member since
1 year
Number of followers
16
Documents
29332
Last sold
9 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

55 reviews

5
19
4
14
3
12
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions