Operating System & Network Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. You can quickly access a program or storage location with which of the following?

Question 2 2. Which software is used to process instructions and coordinate between devices?

Question 3 3. Where do we find access to the tools we use on the computer?

Question 4 4. Which statement below is not a subject that would be included in an Access Control Policy (ACP)?

Question 5 5. An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____.

Page 2

Question 6 6. Which policy informs users on how to handle an organizations confidential or sensitive information?

Question 7 7. A program which stands as a barrier between a computer system and external traffic is known as _____.

Question 8 8. The two types of OS backups are:

Question 9 9. Computer security is:

Question 10 10. If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?

Page 3

Question 11 11. If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?

Question 12 12. When can a network security hardware appliance stop threats on the network?

Question 13 13. What is required for a VPN to function correctly?

Question 14 14. What are two types of VPNs?

Question 15 15. What service does a VPN solution provide?

Page 4

Question 16 16. What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall's access policy protection?

Question 17 17. A firewall can be used to direct and control traffic _____.

Question 18 18. Which of the following is the purpose of a firewall access policy?

Question 19 19. Viruses, worms, and Trojan horses are a type of _____.

Question 20 20. The type of network security threat that employs fraudulent attempts to obtain private information is called _____

Page 5

Question 21 21. According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.

Question 22 22. Two of the first steps in developing a network security policy are:

Question 23 23. A network security policy:

Question 24 24. A/An _____ specifies proper utilization of company computer resources and how to protect private information.

Question 25 25. When you delete files and shortcuts on your computer, they end up in the _____.

Page 6

Question 26 26. When implementing OS security policies and procedures, how often should organizations review them?

Question 27 27. The operating system uses _____ to ensure users have authorized access to the computer system.

Question 28 28. Which of the following are NOT a method to deliver network security?

Question 29 29. What are some of the tunneling protocols that VPNs use?

Question 30 30. Live threat-intelligence helps the firewall to identify and stop _____.

Operating System & Network Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support