ITS 3250 - Security Policies and Auditing

Review for First Test

The following questions are provided to help you study for the first test. Do not expect to see these exact questions on the test.

  1. Is the firewall enabled by default on Mac OSX?

  2. Which of the following is a type of encryption?

    A.) RSA

    B.) AES

    C.) TwoFish

    D.) All of the above

  3. True or False: You can turn off the "Guest Account" in a Mac system.

  4. How many keys does RSA Encryption use?

    A) None

    B) One

    C) Two

    D) Four

  5. True or False: It is possible to install a Mac OSX virtual without changing settings in Virtual Box.

  6. True or False: You can clone a virtual domain controller from an existing virtual domain controller.

  7. What are some of the conditions that must exist for you to create group policies on your network?

  8. How does the scope of a GPO that is linked to your domain compare to the scope of one that is linked to the OU for one geographic location?

  9. What is the basic difference between the intended uses of Monolithic and Functional GPOs?

  10. When writing official procedures for users, what tools and levels in MS Word can be of assistance to you?

  11. What does "chronological order" have to do with writing instructions for setting up and configuring systems?

  12. True or False: Company sensitive information transmitted by email should be encrypted.

  13. What does AES stand for?

  14. What does SOP stand for?

  15. Do you have to admit that you "love apple" should you wish to install a Mac OSX virtual machine?