Chp5
How does heuristic detection detect a virus?
A virtualized environment is created and the code is executed in it.
Which is the first step in securing an operating system?
Develop the security policy.
Which is the preferred means of trapping user input for errors?
Fuzz testing
_____allows for a single configuration to be set and then deployed to many or all users.
Group Policy
Which of the following is NOT a Microsoft Windows setting that can be configured through a security template?
Keyboard Mapping
Which of the following is not used to secure a desktop computer?
Remote wipe/sanitation
Which of the following is NOT an advantage to an automated patch update service?
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
Cannot be used along with fencing as a security perimeter?
Vapor barrier
A(n) _____ can provide details regarding requests for specific files on a system.
access log
A can be used to secure a mobile device.
cable lock
A lock that extends a solid metal bar into the door frame for extra security is the .
deadbolt lock
Errors that occur while an application is running are called _______.
exceptions
A addresses a specific customer situation and often may not be distributed outside that customer's organization.
hotfix
A cross-site request forgery (XSRF) .
is used to inherit the identity and privileges of the victim
Each of the following is true about data loss prevention (DLP) except ________.
it can only protect data in use
The residential lock most often used for keeping out intruders is the .
keyed entry lock
Each of the following is a type of matching used by anti-virus software except .
match scanning
A mantrap .
monitors and controls two interlocking doors to a room
A typical configuration baseline would include each of the following except .
performing a security risk assessment
______ is a list of approved e-mail senders?
whitelist