Podcast
Questions and Answers
Access control and authentication are not important in OS security?
Access control and authentication are not important in OS security?
False (B)
Data encryption ensures that unauthorized access to data will make it intelligible.
Data encryption ensures that unauthorized access to data will make it intelligible.
False (B)
Regular updates and patches are not necessary for maintaining a secure computing environment?
Regular updates and patches are not necessary for maintaining a secure computing environment?
False (B)
Transport layer encryption protocols do not add an extra layer of protection to data during transmission over networks?
Transport layer encryption protocols do not add an extra layer of protection to data during transmission over networks?
User authentication ensures that only unauthorized individuals gain access to the system?
User authentication ensures that only unauthorized individuals gain access to the system?
Security ensures the authentication of system users to protect the integrity of the information stored in the system, both data and code. True or False?
Security ensures the authentication of system users to protect the integrity of the information stored in the system, both data and code. True or False?
Protection mechanisms control access to a system by limiting the types of file access permitted to users. True or False?
Protection mechanisms control access to a system by limiting the types of file access permitted to users. True or False?
The security system prevents authorized access, malicious destruction or alteration of data, and accidental introduction of inconsistency. True or False?
The security system prevents authorized access, malicious destruction or alteration of data, and accidental introduction of inconsistency. True or False?
Protection mechanisms ensure that only processes with proper authorization from the operating system can operate on memory segments, the CPU, and other resources. True or False?
Protection mechanisms ensure that only processes with proper authorization from the operating system can operate on memory segments, the CPU, and other resources. True or False?
Mechanisms providing protection must offer a means for specifying controls to be imposed, together with a means of enforcing them. True or False?
Mechanisms providing protection must offer a means for specifying controls to be imposed, together with a means of enforcing them. True or False?
Flashcards are hidden until you start studying