Chapter 4
which of these is not a state of data that DLP examines? data-in-use data-in process data-in-transit data-at-rest
data-in -process
A lock that extends a solid metal bar into the door frame for extra security is the __________________________
deadbolt lock
what is the first step in securing an operating system?
develop the security policy
---------------allows for a single configuration to be set and then deployed to many or all users.
group policy
a _________________________addresses a specific customer situation and often may not be distributed outside that customers orginization
hotfix
What type of controls are the processes for developing and ensuring that policies and procedures are carried our?
Administrative Conrols
Which of the following is not designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow? barricade fencing roller barrier type v controls
barricade
a _________________________can be used to secure a mobile device.
cable lock
how does heuristic detection detect a virus?
A virtualized environment is created and the code is executed in it.
Which statement about data loss prevention (DLP) is not true? It can only protect data while it is on the user's personal computer. it can scan data on a DVD it can read inside compressed files a policy violation can generate a report or block the data
It can only protect data while it is on the user's personal computer.
Which of the following is not an activity phase control? A.Compensating control B. detective control C. resource Control D. deterrent control
Resource Control
what is not an advantage to an automated patch update service?
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
Which statement about a mantrap is true? Is illegal in the US it monitors and controls two interlocking doors to a room. has a special key lock it requires a cipher lock
it monitors and controls two interlocking doors to a room.
The residential lock most often used for keeping out intruders is the ___________________________
key entry lock
which of the following is not a microsoft windows setting that can be configured through a security template? account policies user rights keyboard mapping system services
keyboard mapping
Which of the following is not a motion detection method? radio frequency moisture magnetism infarred
moisture
a typical configuration baseline would include the following except_________________________ changing any default settings that are insecure eliminating any unnecessary software enabling operating system security features performing a security risk assessment
performing a security risk assessment
which of the following is not a chracteristic of an alarmed carrier PDS? periodic visual inspection continuous monitoring carrier can be hidden below a floor eliminates the need to seal connections
periodic visual inspection
Which of the following cannot be used along with fencing as a security perimeter? vapor barrier rotating spikes roller barrier anti-climb paint
vapor barrier
which of these is a list of approved email senders? blacklist whitelist greylist greenlist
whitelist