Quiz 2 Material Flashcards
Each layer of code needs appropriate hardening measures in place to provide appropriate security services. T/F
True
It is possible for a system to be compromised during the installation process. T/F
True
The default configuration for many operating systems (OS) usually maximizes security. T/F
False
A malicious driver can potentially bypass many security controls to install malware T/F
True
Performing regular backups of data on a system is a critical control that assists with maintaining the integrity of the system and user data. T/F
True
Many users choose a password that is too short or too easy to guess because it is hard for users to remember long and random passwords
True
User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and the source is authentic T/F
False
In a biometric scheme some physical characteristics of the individual is mapped into a digital representation T/F
True
What needs to be taken into consideration during the system security planning process?
- How users are authenticated
- The categories of users of the systems
What access the system has to information stored on other hosts
Which steps should be used to secure an operating system?
- Test the security of the basic OS
- remove unnecessary services
- Install and patch the operating system.
____ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
White Listing
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the _____
verification step
Recognition by fingerprint, retina, and face are examples of ____
static biometrics
Voice pattern, handwriting characteristics, and typing rhythm are examples of ____
dynamic biometrics
A ____ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.
Reactive password checking