1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Microsoft Baseline Security Analyzer (MBSA) checks one or more Windows machines to see if they have basic security in place.
true
Nessus is the premiere network vulnerability scanner.
true
Experience is the most important factor when looking for a security professional.
true
CNE, MCITP, CISSP, and CCNA are examples of industry certifications.
true
Every open port on a router is a possible avenue of entry for a malware or intruder.
true
For individual computers not running firewall software, you should directly close ports.
false
Windows has a built in firewall, but Linux does not.
false
There should be a firewall between your network and the outside world.
true
A good password should contain only letters and numbers.
false
A good rule of thumb for a password history policy is a history depth of five.
true
The first rule of computer security is to check ___________.
patches
Any _________ you do not explicitly need should be shut down.
ports
For an individual machine that is not running firewall software, you do not directly close ports. You shut down the _________ using that port.
None of the above
A password policy for a 90- or 180-day replacement schedule is called password
age
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password. This is particularly important if your password policy has a history depth of five.
Minimum password age
A good password has at least ______ characters.
8
Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.
once
The process to make a system as secure as it can be without adding on specialized software or equipment is _______________
Hardening
On a server, you should create your own accounts with ________ that reflect their level of permission.
names
A _________ involves setting up two firewalls: an outer and an inner firewall.
DMZ (demilitarized zone)
The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.
routers