Security+ Ch.9 (6th edition)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

Barricade

Which of the following can be used to secure a laptop or mobile device?

Cable lock

Which of the following types of testing uses unexpected or invalid inputs?

Dynamic analysis

What allows for a single configuration to be set and then deployed to many or all users?

Group Policy

Which statement about a mantrap is true?

It monitors and controls two interlocking doors to a room.

Which type of residential lock is most often used for keeping out intruders?

Keyed entry lock

Which of the following is NOT a motion detection method?

Moisture

Which type of operating system runs on a firewall, router, or switch?

Network OS

Which of the following is NOT a characteristic of an alarmed carrier PDS?

Requires periodic visual inspections

Which of the following is NOT a typical OS security configuration?

Restricting patch management

Which of the following is a cumulative package of all patches?

Service pack

Which stage is a "quality assurance" test that verifies the code functions as intended?

Staging stage

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?

Supply chains take advantage of the trusted "chain of trust" concept.

How does heuristic detection detect a virus?

The bytes of a virus are placed in different "piles" and then used to create a profile.

Which of the following is NOT an advantage to an automated patch update service?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

How can an SDIO card be made secure?

Using the security mechanisms on a standard Wi-Fi network.

A lock that extends a solid metal bar into the door frame for extra security is the _____.

deadbolt lock

Which of the following is NOT a memory vulnerability?

Variable overflow

Which model uses a sequential design process?

Waterfall model

Which of these is a list of approved email senders?

Whitelist


Ensembles d'études connexes

COMM 1101 Exam 1: Chapter 6 (Topic Development)

View Set

Fundamentals of Nursing Chapter 12: Diagnosing

View Set

Ch. 4: Cultural Dynamics in Assessing Global Markets

View Set