Module 3 topic 4 - 7. Why is it important to protect files...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Module 3, Topic 4 - Security Return to List of Topics. Topics. Reading Self Assessment Exercises Reading Chapter 7 of Systems Administration. Self Assessment Exercises 1. What are the key considerations when think about security? 2. What is the weakest link in any computer system? 3. Describe the key elements of a good security policy. 4. Describe the key elements of a good security plan. 5. What are the "Unix lines of defense"? 6. What are One-Time Passwords where would they be useful?
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 7. Why is it important to protect files within a file system? 8. What function does an access control list perform? 9. What is Crypt? When/where is it used? 10. What is PGP? 11. What function does TCP Wrappers perform? 12. What is port scanning? 13. Describe some firewall configurations. What are the advantages and disadvantages of each? 14. What are the measures we can take to harden our computer systems? 15. What types of security tasks can be automated?...
View Full Document

This note was uploaded on 01/13/2012 for the course ITC 333 taught by Professor Krishnam during the Three '11 term at Charles Sturt University.

Ask a homework question - tutors are online