Final - SEC-110

¡Supera tus tareas y exámenes ahora con Quizwiz!

cellular telephony

A communications network in which the coverage area is divided into hexagon-shaped cells.

C. Jailbreaking

A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called? A. Rooting B. Sideloading C. Jailbreaking D. Ducking

deadbolt lock

A lock that extends a solid metal bar into the door frame for extra security is the _____.

ANT

A proprietary wireless network technology that is used primarily by sensors for communicating data.

C. Infrared

Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today? A. ANT B. Bluetooth C. Infrared D. NFC

bring your own device (BYOD)

Allows users to use their own personal mobile devices for business purposes.

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

Anti-climb

None

Apps are small and very useful software programs that range from essential to just silly. They are available from device manufacturers, OS providers, and third parties. Which of the app types listed can be side-loaded on an iOS device?

What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?

Bayesian filtering

What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?

CCTV

A. Type D

Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? A. Type D B. Mini C. Micro D. Standard

choose your own device (CYOD)

Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.

Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.)

Employing least functionality Disabling unnecessary ports and services Disabling default accounts/passwords

A compiled code test is used to ensure that the projected application meets all specifications at that point

False

The BIOS was software that was integrated into the computer's motherboard. T/F

False

The strongest starting point for the boot process for a computer is the software root of trust.

False

The testing stage is a "quality assurance" test to verify that the code functions as intended.

False

Tightening security during the design and coding of an OS is called "locking."

False

When securing a laptop, it can be placed in an office or a desk drawer.

False

What type of update does not allow a user to refuse or delay security updates?

Forced

A. reset to factory settings

Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device? A. reset to factory settings B. extend lockout period C. enable high security D. lock device

Using the security mechanisms on a standard Wi-Fi network.

How can an SDIO card be made secure?

The bytes of a virus are placed in different "piles" and then used to create a profile.

How does heuristic detection detect a virus?

On-boarding

In MDM terms, which choice would most quickly get a device enrolled on a network?

C. CYOD

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? A. BYOD B. COPE C. CYOD D. Corporate-owned

D. push notification services

Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use? A. MCM B. COPE C. MAM D. push notification services

D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security? A. USB OTG uses strong security and the executive should have no concerns. B. Subnotebooks do not support USB OTG. C. An unsecured mobile device could infect other tethered mobile devices or the corporate network. D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.

Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates? A. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. B. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks. D. Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.

Which of the following is a popular type of removable data storage used on mobile devices?

SD

A Wi-Fi enabled microSD card is an example of what type of device?

SDIO

What security standard was introduced in conjunction with UEFI?

Secure Boot

What software methodology includes security automation?

Secure DevOps

Chain of Trust

Select the response that best identifies the method of using UEFI and Secure Boot to validate the first element of the boot process then validate each consecutive element before handing the hardware over to the operating system?

containerization

Separating storage into separate business and personal "containers."

Anti-virus products typically utilize what type of virus scanning analysis?

Static analysis

Supply Chain Infection

System or device infections can be introduced during the manufacture or storage of the items. How is this described?

What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

TEMPEST

application management

The tools and services responsible for distributing and controlling access to apps.

1234

This PIN is used by well over 10% of ATM users in a recent survey of banks limiting the codes to 4 digits.

content management

Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.

An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area.

True

An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.

True

In the production stage the application is released to be used in its actual setting.

True

One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.

True

Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.

True

carrier unlocking

Uncoupling a phone from a specific wireless provider.

context-aware authentication

Using a contextual setting to validate a user.

How can an area be made secure from a non-secured area via two interlocking doors to a small room?

Using a mantrap

A. mobile device management (MDM)

What allows a device to be managed remotely? A. mobile device management (MDM) B. mobile application management (MAM) C. mobile resource management (MRM) D. mobile wrapper management (MWM)

Group Policy

What allows for a single configuration to be set and then deployed to many or all users?

Wrong passcode 3 times

What criteria has to be met for you to get a picture of the person that stole your tablet?

D. It separates personal data from corporate data.

What does containerization do? A. It splits operating system functions only on specific brands of mobile devices. B. It places all keys in a special vault. C. It slows down a mobile device to half speed. D. It separates personal data from corporate data.

B. geofencing

What enforces the location in which an app can function by tracking the location of the mobile device? A. location resource management B. geofencing C. GPS tagging D. Graphical Management Tracking (GMT)

B. geolocation

What is the process of identifying the geographical location of a mobile device? A. geotracking B. geolocation C. geoID D. geomonitoring

B. screen lock

What prevents a mobile device from being used until the user enters the correct passcode? A. swipe identifier (SW-ID) B. screen lock C. screen timeout D. touch swipe

Import Security Template

When securing a Windows OS in a corporate environment, which of the elements shown will quickly apply the desired security settings of a properly configured host to the target system?

Alarm will sound

When your tablet is missing, you realize that you last used it in class and had the speakers set to mute. Which result can you expect if you try to track it by playing a sound?

Waterfall model

Which model uses a sequential design process?

UEFI, and Secure Boot

Which of the choices were implemented to combat motherboard firmware infections caused by corrupted updates?

Cable lock

Which of the following can be used to secure a laptop or mobile device?

Automated Patch Update Service

Which of the following choices describes the process of testing updates and patches before distributing them to your organization in order to ensure stable operation?

Requires periodic visual inspections

Which of the following is NOT a characteristic of an alarmed carrier PDS?

Variable overflow

Which of the following is NOT a memory vulnerability?

Moisture

Which of the following is NOT a motion detection method?

Supply chains take advantage of the trusted "chain of trust" concept.

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?

Restricting patch management

Which of the following is NOT a typical OS security configuration?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Which of the following is NOT an advantage to an automated patch update service?

Barricade

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

Service pack

Which of the following is a cumulative package of all patches?

A. MMS

Which of the following technologies provides for pictures, video, or audio to be included in text messages? A. MMS B. QR C. SMS D. ANT

Dynamic analysis

Which of the following types of testing uses unexpected or invalid inputs?

D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

Which of these is NOT a risk of connecting a mobile device to a public network? A. Public networks are beyond the control of the employee's organization. B. Replay attacks can occur on public networks. C. Public networks may be susceptible to man-in-the-middle attacks. D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

B. last known good configuration

Which of these is NOT a security feature for locating a lost or stolen mobile device? A. remote lockout B. last known good configuration C. alarm D. thief picture

Whitelist

Which of these is a list of approved email senders?

A. password

Which of these is considered the strongest type of passcode to use on a mobile device? A. password B. PIN C. fingerprint swipe D. draw connecting dots pattern

Staging stage

Which stage is a "quality assurance" test that verifies the code functions as intended?

It monitors and controls two interlocking doors to a room.

Which statement about a mantrap is true?

A. physical keyboard

Which technology is NOT a core feature of a mobile device? A. physical keyboard B. small form factor C. local non-removable data storage D. data synchronization capabilities

A. MAM

Which tool manages the distribution and control of apps? A. MAM B. MDM C. MCM D. MFM

B. RTOS

Which type of OS is typically found on an embedded system? A. SoC B. RTOS C. OTG D. COPE

Network OS

Which type of operating system runs on a firewall, router, or switch?

Keyed entry lock

Which type of residential lock is most often used for keeping out intruders?

What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

antivirus

What type of OS in firmware is designed to manage a specific device like a video game console?

appliance OS

Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:

cable lock

Which of the following is an AV heuristic monitoring technique?

code emulation

What specific process in application development removes a resource that is no longer needed?

deprovisioning

What type of storage is used on mobile devices?

flash memory

Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?

heuristic monitoring

Which OS hardening technique removes all unnecessary features that may compromise an operating system?

kernel pruning

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

least functionality

What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

mail gateway

What publicly released software security update is intended to repair a vulnerability?

patch

What type of tools are involved in effective patch management? (Choose all that apply.)

patch distribution patch reception

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

roller barrier

In Microsoft Windows, what type of templates are a collection of security configuration settings?

security

What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

service pack

Which of the following are application development stages? (Choose all that apply.)

testing staging

Which application development life-cycle model uses a sequential design process?

waterfall

What type of OS manages hardware and software on a client computer?

workstation OS


Conjuntos de estudio relacionados

Las asignaturas definiciones part 1

View Set

Exam: 03.00 Module Three Pretest Geometry

View Set

ASA Hydraulic and Pneumatic Power sys

View Set

Texas Promulgated Forms Final Review 2

View Set