information security

Quiz Questions

Part 1: True/False – Multiple Choice answers (2 Points Each)

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Administrators should perform the following steps to harden and securely configure a server OS.

  • Remove unnecessary services, applications, and network protocols.
  • Configure OS user authentication.
  • Configure resource controls appropriately.

Answer: ____

The Windows 10 defense stack includes: Device protection, Threat resistance, Identity protection, information protection, Breach detection investigation & response.

Answer: ____

Desktops are most often virtualized on computers with bare metal virtualization.Servers are most often virtualized on computers with hosted virtualization.

Answer: ____

A virtual machine has less layers than a native OS-based machine and so it has no potential for any vulnerabilities and no security problems.

Answer: ____

Part 2: Short Answers (10 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.

  • Briefly explain the steps to harden and securely configure a server OS.
  1. Briefly explain what a buffer overflow is and how it is mitigated.
  2. Briefly describe these different malware types: Virus, Trojan horse, worm, adware, spyware, bot and rootkit.Provide an example of how each one is mitigated.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.