100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
04-04-2025
Geschreven in
2024/2025

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+ host - Answers any device with an IP address host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting physical access, install secure configuration options, minimize number of apps and OS services running on the host) back up - Answers host hardening, without this nothing else matters: physical access - Answers host hardening; restrict _______________________ ____________ to the host secure configuration options - Answers host hardening; install the operating system in a manner that ensures default passwords are replaced with strong passwords applications, services - Answers host hardening; minimize the number of ______________ and operating system ___________ that run on the host to reduce the ability of hackers to take over the host. some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities; hackers can take them over very quickly - Answers the problems that require servers and host to be hardened servers, clients, routers - Answers common hosts applications - Answers harden all ____________ on the host patches - Answers download and install _________ for known operating system vulnerabilities users, groups - Answers manage _________ and _____________ permissions - Answers manage access ____________ for users and groups separately encrypt - Answers _______________ data if appropriate firewall - Answers add a host _________________ logs - Answers read operating system ____________ regularly to look for suspicious activities vulnerability tests - Answers run ______________________ against the system regularly to identify security weaknesses that were not caught in the normal course of installation or operation security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type disk images - Answers full copies of installations disk images - Answers saves money on computer installations and ensures each server is properly configured to the firm's security baselines and general security policies security baselines - Answers specifications for how hardening should be done systems administrators - Answers server administrators are called implement security baseline actions - Answers systems adminstrators uniformity in hardening - Answers security baselines help to ensure network administration - Answers systems administrators are not usually responsible for virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization virtualization - Answers allows multiple operating systems with their associated applications and data to run independently on a single physical machine virtual machines - Answers run their own operating system and share local system resources allows systems administrators to create a single security baseline for each server (or remote client) within the organization; minimizes chances of incorrect configurations; eliminates need to install applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of virtualization systems administrators - Answers IT employees who manage individual hosts or groups of hosts cloud computing - Answers uses processing power, applications, data storage and other services over the internet software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and its associated data are hosted in the cloud and accessed using a web browser thin clients - Answers essentially a screen, keyboard and connection to the mainframe mainframe - Answers where all application processing occurs and data is stored stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers) reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers advantages of cloud computing include using a third party service provider, trust, compliance - Answers corporations have b

Meer zien Lees minder
Instelling
Corporate Computer Security
Vak
Corporate Computer Security









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Corporate Computer Security
Vak
Corporate Computer Security

Documentinformatie

Geüpload op
4 april 2025
Aantal pagina's
10
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Corporate Computer Security - Chapter 7 Questions with Correct Answers Graded A+

host - Answers any device with an IP address

host hardening - Answers the process of protecting a host against attacks (i.e. backing up, restricting
physical access, install secure configuration options, minimize number of apps and OS services running
on the host)

back up - Answers host hardening, without this nothing else matters:

physical access - Answers host hardening; restrict _______________________ ____________ to the
host

secure configuration options - Answers host hardening; install the operating system in a manner that
ensures default passwords are replaced with strong passwords

applications, services - Answers host hardening; minimize the number of ______________ and
operating system ___________ that run on the host to reduce the ability of hackers to take over the
host.

some attacks inevitably reach host computers; servers installed out of the box have vulnerabilities;
hackers can take them over very quickly - Answers the problems that require servers and host to be
hardened

servers, clients, routers - Answers common hosts

applications - Answers harden all ____________ on the host

patches - Answers download and install _________ for known operating system vulnerabilities

users, groups - Answers manage _________ and _____________

permissions - Answers manage access ____________ for users and groups separately

encrypt - Answers _______________ data if appropriate

firewall - Answers add a host _________________

logs - Answers read operating system ____________ regularly to look for suspicious activities

vulnerability tests - Answers run ______________________ against the system regularly to identify
security weaknesses that were not caught in the normal course of installation or operation

security baselines - Answers set of specific actions to be taken to harden all hosts of a particular type
and of particular versions within each type

disk images - Answers full copies of installations

, disk images - Answers saves money on computer installations and ensures each server is properly
configured to the firm's security baselines and general security policies

security baselines - Answers specifications for how hardening should be done

systems administrators - Answers server administrators are called

implement security baseline actions - Answers systems adminstrators

uniformity in hardening - Answers security baselines help to ensure

network administration - Answers systems administrators are not usually responsible for

virtual disk images - Answers can be deployed across a variety of hardware platforms using virtualization

virtualization - Answers allows multiple operating systems with their associated applications and data to
run independently on a single physical machine

virtual machines - Answers run their own operating system and share local system resources

allows systems administrators to create a single security baseline for each server (or remote client)
within the organization; minimizes chances of incorrect configurations; eliminates need to install
applications, patches or service packs; reduces labor costs and utility expenses - Answers benefit of
virtualization

systems administrators - Answers IT employees who manage individual hosts or groups of hosts

cloud computing - Answers uses processing power, applications, data storage and other services over
the internet

software as a service (SaaS) - Answers "on-demand software" is a delivery model in which software and
its associated data are hosted in the cloud and accessed using a web browser

thin clients - Answers essentially a screen, keyboard and connection to the mainframe

mainframe - Answers where all application processing occurs and data is stored

stand-alone clients - Answers CPUs, hard disks and applications (aka personal computers)

reduced costs, reliability, disaster recovery, data loss, scalability, agility, accessibility - Answers
advantages of cloud computing include

using a third party service provider, trust, compliance - Answers corporations have been slow to adopt
cloud computing because

Windows Server - Answers Microsoft's server operating system, security has improved over time
(firewalls, encryption, minimize number of running applications, etc.)

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
359
Lid sinds
1 jaar
Aantal volgers
16
Documenten
29332
Laatst verkocht
3 uur geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

56 beoordelingen

5
19
4
15
3
12
2
0
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen