Quiz 5 Security +

¡Supera tus tareas y exámenes ahora con Quizwiz!

What PIN is considered to be the most commonly used PIN?

1234

Select the proprietary wireless network technology that is used primarily by sensors for communicating data.

ANT

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

Anti-climb

What type of OS in firmware is designed to manage a specific device like a video game console?

Appliance OS

Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:

Cable Lock

What type of technology can add geographical identification data to media such as digital photos taken on a mobile device?

GPS tagging

Which OS hardening technique removes all unnecessary features that may compromise an operating system?

Kernal Pruning

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?

OTG (USB On-the-Go)

What publicly released software security update is intended to repair a vulnerability?

Patch

Which of the following is a popular type of removable data storage used on mobile devices?

SD

A Wi-Fi enabled microSD card is an example of what type of device?

SDIO

What security standard was introduced in conjunction with UEFI?

Secure Boot

What software methodology includes security automation?

Secure DevOps

What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

Service pack

What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and movements that can determine the orientation of the device?

Tablets

Which of the following selections is not one of the features provided by a typical MDM?

Track stolen devices

Which of the following is NOT an Android Smart Lock configuration option?

User device detection

What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

antivirus software

Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?

content management

Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?

context-aware authentication

Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise?

increased internal service

What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

mail gateway

In Microsoft Windows, what type of templates are a collection of security configuration settings?

security

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

​Enable a lock screen


Conjuntos de estudio relacionados

Tableau Specialist Exam practice

View Set

Chapter 7 - Accounting for Sales and Accounts Receivable

View Set