DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Securing Resources
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Social Engineering
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Security Definitions
Security Standards
Key Authentification Techniques
Authentication Methods - Quiz
Access Control
Encrypting Decrypting Data
Encryption Methods-
Applied Encryption Processes
Encryption Authentication Processes
Overall Security Plan
Security Elements Conclusion
Securing Protocol Layers
TCP/IP Network
Physical Data Link
IP Internet Layer
TCP/UDP
Application Layer
TCP/IP Applications
Packet Construction
IP Datagrams
TPC/IP Stack Conclusion
Protocol Layers - Quiz
Securing Resources
Securing Resources Services
OS Security
OS Security Quiz
Protecting TCP/IP
CGI Scripts
Securing Email
Testing Evaluating Network
Security Tools
Security Implementation Conclusion
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
Operating System Security - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
How could an unintentional back door be created?
Please select all the correct answers.
A.
Running redundant services
B.
Changing system defaults
C.
Upgrading your system
D.
Failing to restrict logins
2.
In what ways may protection be provided for system users and groups?
Please select all the correct answers.
A.
Changing the default settings
B.
Assigning only the access levels necessary
C.
Segmenting the operating system
D.
Activate auditing procedures
3.
By partitioning the physical disk on a program by program basis and restricting a service or daemon's access to only a specific partition, you can provide protection for your operating system’s
Please select the best answer.
A.
Users and groups
B.
Passwords
C.
Files
D.
Defaults
4.
Which of the following is a common security feature found in modern operating systems?
Please select the best answer.
A.
Virtual memory
B.
Device drivers
C.
System registry
D.
Task scheduler