Chapter 9: Client and Application Security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT a characteristic of an alarmed carrier PDS? (Enter letter for answer) A) Requires periodic visual inspections B) Carrier can be hidden above the ceiling C) Uses continuous monitoring D) Eliminates the need to seal connections

A

How can an SDIO card be made secure? (Enter letter for answer) A) Requiring a username before accessing the SDIO card. B) Using the security mechanisms on a standard Wi-Fi network. C) SDIO cards are natively secure and no security settings are needed. D) Turning on patch updates to the SDIO card.

B

Which of the following is NOT a reason why supply chain infections are considered especially dangerous? (Enter letter for answer) A) It is virtually impossible to closely monitor every step in the supply chain. B) Supply chains take advantage of the trusted "chain of trust" concept. C) Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected. D) If the malware is planted in the ROM firmware of the device this can make it 5 or sometimes even impossible to clean an infected device.

B

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow? A) Type V controls B) Fencing C) Roller barrier D) Barricade

Barricade

How does heuristic detection detect a virus? (Enter letter for answer) A) The virus signature file is placed in a suspended chamber before streaming to the CPU. B) The bytes of a virus are placed in different "piles" and then used to create a profile. C) A virtualized environment is created and the code is executed in it. D) A string of bytes from the virus is compared against the suspected file.

C

Which of the following is NOT a typical OS security configuration? (Enter letter for answer) A) Disabling unnecessary ports and services B) Employing least functionality C) Restricting patch management D) Disabling default accounts/passwords

C

Which of the following is NOT an advantage to an automated patch update service? (Enter letter for answer) A) Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available. B) Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server. C) Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service. D) Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs.

C

Which statement about a mantrap is true? (Enter letter for answer) A) It requires the use of a cipher lock. B) It is illegal in the United States. C) It monitors and controls two interlocking doors to a room. D) It is a special keyed lock.

C

Which of the following can be used to secure a laptop or mobile device? A) Cable lock B) Mobile connector C) Mobile chain D) Security tab

Cable lock

Which of the following types of testing uses unexpected or invalid inputs? A) Runtime testing B) Stress testing C) Dynamic analysis D) Static analysis

Dynamic analysis

What allows for a single configuration to be set and then deployed to many or all users? A) Command Configuration B) Active Directory C) Snap-In Replication (SIR) D) Group Policy

Group Policy

Which type of residential lock is most often used for keeping out intruders? A) Passage lock B) Privacy lock C) Encrypted key lock D) Keyed entry lock

Keyed entry lock

Which of the following is NOT a motion detection method? A) Radio frequency B) Magnetism C) Moisture D) Infrared

Moisture

Which type of operating system runs on a firewall, router, or switch? A) Network OS B) Resource OS C) Device OS D) Server OS

Network OS

Which of the following is a cumulative package of all patches? A) Patch B) Service pack C) Rollup D) Hotfix

Service pack

Which stage is a "quality assurance" test that verifies the code functions as intended? A) Production stage B) Testing stage C) Staging stage D) Development stage

Staging stage

Which of the following is NOT a memory vulnerability? A) Buffer overflow B) Variable overflow C) Pointer deference D) DLL injection

Variable overflow

Which model uses a sequential design process? A) Rigid model B) Secure model C) Agile model D) Waterfall model

Waterfall model

Which of these is a list of approved email senders? A) Blacklist B) Yellowlist C) Bluelist D) Whitelist

Whitelist

A lock that extends a solid metal bar into the door frame for extra security is the _______. A) deadbolt lock B) full bar lock C) deadman's lock D) triple bar lock

deadbolt lock


Kaugnay na mga set ng pag-aaral

Chapter 37: Disorders of Gastrointestinal Function #1

View Set

Unit I-Business Ethics-04-Corporate Governance

View Set

Psych Exam 2 (Intelligence, Language) Exam Practice Q's

View Set

Quiz #4 C-C-C-C-Combo breaaakkkerrr

View Set

Embryo-6-Placenta and Amniotic Fluid

View Set

Bio test #1, 2, & 3 answers, BIO 104 chapter 5.1 & 5.2, BIOL 104 test #2 chapter 3.1-3.3, BIO 104 chapter 6.1 & 6.2, BIO 104 chapter 8.1 & 10.2

View Set