Copyright

Security in Operating Systems Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What is an example of an occurrence for which the disaster recovery policy would be needed?

Question 2 2. What is criteria commonly defined in a data breach policy?

Question 3 3. Which of the following is an example of a requirement set forth in an acceptable use policy?

Question 4 4. The operating system uses _____ to ensure users have authorized access to the computer system.

Question 5 5. The two types of OS backups are:

Page 2

Question 6 6. A program which stands as a barrier between a computer system and external traffic is known as _____.

Question 7 7. Which one of the following is an example of role-based access control?

Question 8 8. Which one of the following is an example of physical security? Choose the best answer.

Question 9 9. Which one of the following refers to the use of guarding actual computing hardware from unauthorized access?

Question 10 10. A(n) _____ is really anything on your computer that may damage or steal your data, or allow someone else to access your computer without your knowledge or consent.

Page 3

Question 11 11. _____ is a general term used to describe many types of bad software.

Question 12 12. Both _____ and _____ need to be updated regularly to protect our computers from new viruses and vulnerabilities.

Question 13 13. What does integrity mean for a computer system?

Question 14 14. Should the strictest possible security controls be put in place for every computer system?

Question 15 15. What are some examples of computer security measures and controls?

Page 4

Question 16 16. What is user access security?

Question 17 17. System monitoring and auditing involves _____.

Question 18 18. Password security used to secure a user's access to a system is most effective when _____.

Question 19 19. Which of the following policies is NOT specifically associated with remote access?

Question 20 20. The operating system's role in the protection of the system from physical threats involves:

Page 5

Question 21 21. Which one of the following can remotely wipe lost or stolen laptops and computers?

Question 22 22. _____, such as installing unlicensed software or clicking on links in untrusted emails, may create a computer security risk.

Question 23 23. What is the BEST way to ensure that computer security controls continue to perform their function?

Question 24 24. The ability to restrict individuals or groups of individuals to certain functions within an application is called _____.

Question 25 25. Which of the following is a motivator for an organization to create a computer security policy

Page 6

Question 26 26. Computer security is:

Question 27 27. Computer security is fundamentally about which one of the following?

Question 28 28. _____ is a form of computer security risk, known as malware, that makes your files unreadable by encrypting them and forcing the user to pay a ransom to get the key.

Question 29 29. What does CIA in the CIA triad stand for in computer and information security?

Question 30 30. The process of recording events that take place in a system or application is known as _____.

Security in Operating Systems Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 305: Operating Systems  /  Computer Science Courses
Support