Answer the following statements true (T) or false (F)

1) All users with access to a system will have the same access to all data and resources on that system.
2) Host-based firewalls, IDS, and IPS software also may improve security
by limiting remote network access to services on the system.
3) You should stage and validate all patches on test systems before deploying them in production.
4) The superuser is exempt from the usual file access control constraints and has systemwide access.
5) DAC is based on the roles that users assume in a system rather than the user’s identity.


1) F
2) T
3) T
4) T
5) T

Computer Science & Information Technology

You might also like to view...

Programming is sometimes referred to as ____.

A. operating B. marking C. coding D. codexing

Computer Science & Information Technology

Describe a portable hotspot.

What will be an ideal response?

Computer Science & Information Technology

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.

A. ?Explicit congestion control B. ?Implicit congestion control C. ?Connection admission control D. ?Buffer preallocation

Computer Science & Information Technology

PCs can play media in the QuickTime format, though they need a QuickTime ____________________ to do so.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology