ITN 260- Chapter 9
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
Anti-climb
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
Antivirus
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
Bayesian Filtering
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Cable Lock
Which of the following is an AV heuristic monitoring technique?
Code emulation
What specific process in application development removes a resource that is no longer needed?
Deprovisioning
The BIOS was software that was integrated into the computer's motherboard.
False
What type of storage is used on mobile devices?
Flash Memory
What type of update does not allow a user to refuse or delay security updates?
Forced
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?
Heuristic Monitoring
Which OS hardening technique removes all unnecessary features that may compromise an operating system?
Kernal Pruning
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?
Least Functionality
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
Roller Barrier
Which of the following is a popular type of removable data storage used on mobile devices?
SD
A Wi-Fi enabled microSD card is an example of what type of device?
SDIO
What security standard was introduced in conjunction with UEFI?
Secure Boot
What software methodology includes security automation?
Secure DevOps
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
Service Pack
An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area.
True
In the production stage the application is released to be used in its actual setting.
True
One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
True
Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.
True
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Using a Mantrap
Which application development life-cycle model uses a sequential design process?
Waterfall
What type of OS manages hardware and software on a client computer?
Workstation OS