information security 49

Quiz Questions

Part 1: True/False – Multiple Choice answers (2 Points Each)

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Administrators should perform the following steps to harden and securely configure a server OS.

  • Remove unnecessary services, applications, and network protocols.
  • Configure OS user authentication.
  • Configure resource controls appropriately.

Answer: ____

The Windows 10 defense stack includes: Device protection, Threat resistance, Identity protection, information protection, Breach detection investigation & response.

Answer: ____

Desktops are most often virtualized on computers with bare metal virtualization.Servers are most often virtualized on computers with hosted virtualization.

Answer: ____

A virtual machine has less layers than a native OS-based machine and so it has no potential for any vulnerabilities and no security problems.

Answer: ____

Part 2: Short Answers (10 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.

  • Briefly explain the steps to harden and securely configure a server OS.
  1. Briefly explain what a buffer overflow is and how it is mitigated.
  2. Briefly describe these different malware types: Virus, Trojan horse, worm, adware, spyware, bot and rootkit.Provide an example of how each one is mitigated.
 
Looking for a similar assignment? Our writers will offer you original work free from plagiarism. We follow the assignment instructions to the letter and always deliver on time. Be assured of a quality paper that will raise your grade. Order now and Get a 15% Discount! Use Coupon Code "Newclient"