100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
04-04-2025
Escrito en
2024/2025

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+ host - Answers any device with an IP address host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting physical access, install secure configuration options, minimize number of apps and OS services running on the host) back up - Answers host hardening, without this nothing else matters: physical access - Answers host hardening; restrict _______________________ ____________ to the host secure configuration options - Answers host hardening; install the operating system in a manner that ensures default passwords are replaced with strong passwords applications, services - Answers host hardening; minimize the number of ______________ and operating system ___________ that run on the host to reduce the ability of hackers to take over the host. some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities; hackers can take them over very quickly - Answers the problems that require servers and host to be hardened servers, clients, routers - Answers common hosts applications - Answers harden all ____________ on the host patches - Answers download and install _________ for known operating system vulnerabilities users, groups - Answers manage _________ and _____________ permissions - Answers manage access ____________ for users and groups separately encrypt - Answers _______________ data if appropriate firewall - Answers add a host _________________ logs - Answers read operating system ____________ regularly to look for suspicious activities vulnerability tests - Answers run ______________________ against the system regularly to identify security weaknesses that were not caught in the normal course of installation or operation security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type disk images - Answers full copies of installations disk images - Answers saves money on computer installations and ensures each server is properly configured to the firm's security baselines and general security policies security baselines - Answers specifications for how hardening should be done systems administrators - Answers server administrators are called implement security baseline actions - Answers systems adminstrators uniformity in hardening - Answers security baselines help to ensure network administration - Answers systems administrators are not usually responsible for virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization virtualization - Answers allows multiple operating systems with their associated applications and data to run independently on a single physical machine virtual machines - Answers run their own operating system and share local system resources allows systems administrators to create a single security baseline for each server (or remote client) within the organization; minimizes chances of incorrect configurations; eliminates need to install applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of virtualization systems administrators - Answers IT employees who manage individual hosts or groups of hosts cloud computing - Answers uses processing power, applications, data storage and other services over the internet software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and its associated data are hosted in the cloud and accessed using a web browser thin clients - Answers essentially a screen, keyboard and connection to the mainframe mainframe - Answers where all application processing occurs and data is stored stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers) reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers advantages of cloud computing include using a third party service provider, trust, compliance - Answers corporations have b

Mostrar más Leer menos
Institución
Corporate Computer Security
Grado
Corporate Computer Security









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Corporate Computer Security
Grado
Corporate Computer Security

Información del documento

Subido en
4 de abril de 2025
Número de páginas
10
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

host - Answers any device with an IP address

host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting
physical access, install secure configuration options, minimize number of apps and OS services running
on the host)

back up - Answers host hardening, without this nothing else matters:

physical access - Answers host hardening; restrict _______________________ ____________ to the
host

secure configuration options - Answers host hardening; install the operating system in a manner that
ensures default passwords are replaced with strong passwords

applications, services - Answers host hardening; minimize the number of ______________ and
operating system ___________ that run on the host to reduce the ability of hackers to take over the
host.

some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities;
hackers can take them over very quickly - Answers the problems that require servers and host to be
hardened

servers, clients, routers - Answers common hosts

applications - Answers harden all ____________ on the host

patches - Answers download and install _________ for known operating system vulnerabilities

users, groups - Answers manage _________ and _____________

permissions - Answers manage access ____________ for users and groups separately

encrypt - Answers _______________ data if appropriate

firewall - Answers add a host _________________

logs - Answers read operating system ____________ regularly to look for suspicious activities

vulnerability tests - Answers run ______________________ against the system regularly to identify
security weaknesses that were not caught in the normal course of installation or operation

security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type
and of particular versions within each type

disk images - Answers full copies of installations

, disk images - Answers saves money on computer installations and ensures each server is properly
configured to the firm's security baselines and general security policies

security baselines - Answers specifications for how hardening should be done

systems administrators - Answers server administrators are called

implement security baseline actions - Answers systems adminstrators

uniformity in hardening - Answers security baselines help to ensure

network administration - Answers systems administrators are not usually responsible for

virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization

virtualization - Answers allows multiple operating systems with their associated applications and data to
run independently on a single physical machine

virtual machines - Answers run their own operating system and share local system resources

allows systems administrators to create a single security baseline for each server (or remote client)
within the organization; minimizes chances of incorrect configurations; eliminates need to install
applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of
virtualization

systems administrators - Answers IT employees who manage individual hosts or groups of hosts

cloud computing - Answers uses processing power, applications, data storage and other services over
the internet

software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and
its associated data are hosted in the cloud and accessed using a web browser

thin clients - Answers essentially a screen, keyboard and connection to the mainframe

mainframe - Answers where all application processing occurs and data is stored

stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers)

reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers
advantages of cloud computing include

using a third party service provider, trust, compliance - Answers corporations have been slow to adopt
cloud computing because

Windows Server - Answers Microsoft's server operating system, security has improved over time
(firewalls, encryption, minimize number of running applications, etc.)
$10.89
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorJosh Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
359
Miembro desde
1 año
Número de seguidores
16
Documentos
29332
Última venta
7 horas hace
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

55 reseñas

5
19
4
14
3
12
2
0
1
10

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes