Professional Documents
Culture Documents
a.Corrective control
b.Compensating control
c.Preventive control
d.Detective control
a.
The operating system must protect users from its environment
b.
The operating system must be protected from itself
c.
The operating system must protect itself from users
d.
3. The operating system must protect users from each other
a. 1, 2, and 3
B. 1
C. 1 and 2
D. 2 and 3
4. Passwords serve to protect user accounts, however it may actually circumvent the
security purpose. What best action can be taken to minimize this?
a. encourage users to not share their password
6. Audit log that summarizes key activities related to users, applications, and system
resources:
a. keystroke monitoring
b. event monitoring
c. access monitoring
d. users monitoring
a.
Firewall
b.
Worm
c.
Trojan horse
d.
Virus
a.
firewalls and data encryption
b.
parity checks and data encryption
c.
echo checks and DPI
d.
echo checks, and parity checks