OS Security
What is used to protect network from outside internet access?
A trusted antivirus
24 hours scanning for virus
Firewall to separate trusted and untrusted network
Deny users access to websites which can potentially cause security leak
Firewall to separate trusted and untrusted network
Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker.
Related posts
What are the characteristics of Host based IDS?A. The host operating system logs in the audit information
B. Logs includes logins,file opens and program executions
C. Logs are analysed to detect tails of intrusion
D. All of the mentioned
Which one of the following is not a secondary storage?
A. Magnetic disks
B. Magnetic tapes
C. RAM
D. None of the mentioned
What are the drawbacks of the host based IDS?
A. Unselective logging of messages may increase the audit burdens
B. Selective logging runs the risk of missed attacks
C. They are very fast to detect
D. They have to be programmed for new patterns
What is the breach of integrity?
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
What are the two features of a tripwire file system?
A. It is a tool to monitor file systems
B. It is used to automatically take corrective action
C. It is used to secure UNIX system
D. None of the mentioned
A swap space can reside in ___________
A. Separate disk partition
B. RAM
C. Cache
D. None of the mentioned
The time for the disk arm to move the heads to the cylinder containing the desired sector is called ___________
A. disk time
B. seek time
C. arm time
D. sector time
Leave a Reply