Security - Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

SDIO

A Wi-Fi enabled microSD card is an example of what type of device?

False

A compiled code test is used to ensure that the projected application meets all specifications at that point

Anti-climb

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?

True

An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area.

True

An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.

roller barrier

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?

Static analysis

Anti-virus products typically utilize what type of virus scanning analysis?

ANSWER: A mantrap is designed to separate a nonsecured area from a secured area. A mantrap device monitors and controls two interlocking doors to a small room (a vestibule). When in operation, only one door is able to be open at any time. Mantraps are used at high-security areas where only authorized persons are allowed to enter, such as sensitive data-processing rooms, cash-handling areas, and research laboratories.

Describe a mantrap.

ANSWER: Code signing Confirms the software author and guarantees the code has not been altered or corrupted. Stored procedure eliminates the need to write a subroutine that could have vulnerabilities.

Explain the security advantages of "code signing" and "stored procedure"?

using a mantrap

How can an area be made secure from a non-secured area via two interlocking doors to a small room?

ANSWER: A protected distribution system (PDS) can be used to protect conduit cables between two locations. This can consist of a hardened carrier PDS, in which the conduit is constructed of special electrical metallic tubing or similar material, or an alarmed carrier PDS, which uses optical fibers and acoustic sensors that can detect vibrations from a potential intruder.

How can cable conduits that run between two secure areas be protected?

The bytes of a virus are placed in different "piles" and then used to create a profile.

How does heuristic detection detect a virus?

ANSWER: Secure Boot is designed to ensure that a computer boots using only software that is trusted by the computer manufacturer. When using UEFI and Secure Boot, as computer boots it checks the digital signature of each piece of boot software, including firmware drivers and the operating system. If the signatures are deemed valid the computer boots; otherwise, the computer does not boot.

How is the UEFI Secure Boot security standard designed to combat BIOS attacks?

security

In Microsoft Windows, what type of templates are a collection of security configuration settings?

True

In the production stage the application is released to be used in its actual setting.

cable lock

Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:

True

One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software

True

Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.

False

The BIOS was software that was integrated into the computer's motherboard.

False

The testing stage is a "quality assurance" test to verify that the code functions as intended.

False

Tightening security during the design and coding of an OS is called "locking."

TEMPEST

What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?

Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server. Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs. Administrators can approve updates for "detection" only; this allows them to see which computers require the update without installing it.

What are some of the advantages to an automated patch update service?

A bollard is a short but sturdy vertical post that is used to as a vehicular traffic barricade to prevent a car from "ramming" into a secured area.

What is a bollard?

A multi-functional device (MFD) combines the functions of a printer, copier, scanner, and fax machine.

What is a multi-functional device (MFD)?

A supply chain is a network that moves a product from the supplier to the customer. It is made up of vendors that supply raw material, manufacturers who convert the material into products, warehouses that store products, distribution centers that deliver them to the retailers, and retailers who bring the product to the consumer. Supply chain infections are considered especially dangerous. First, if the malware is planted in the ROM firmware of the device, it can be difficult or sometimes impossible to clean an infected device.

What is a supply chain and why is it critical to understand that it needs to be secured?

ANSWER: Provisioning is the enterprise-wide configuration, deployment, and management of multiple types of IT system resources, of which the new application would be viewed as a new resource.

What is provisioning?

service pack

What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?

mail gateway

What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

patch

What publicly released software security update is intended to repair a vulnerability?

least functionality

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

Secure Boot

What security standard was introduced in conjunction with UEFI?

Secure DevOps

What software methodology includes security automation?

deprovisioning

What specific process in application development removes a resource that is no longer needed?

antivirus

What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?

Appliance OS

What type of OS in firmware is designed to manage a specific device like a video game console?

Workstation OS

What type of OS manages hardware and software on a client computer?

Bayesian Filtering

What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?

A package known as antispyware helps prevent computers from becoming infected by different types of spyware.

What type of package helps prevent computers from becoming infected by different types of spyware?

flash memory

What type of storage is used on mobile devices?

B patch distribution D patch reception

What type of tools are involved in effective patch management? (Choose all that apply.)

forced

What type of update does not allow a user to refuse or delay security updates?

CCTV

What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?

False

When securing a laptop, it can be placed in an office or a desk drawer.

heuristic monitoring

Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?

kernel prunning

Which OS hardening technique removes all unnecessary features that may compromise an operating system?

waterfall

Which application development life-cycle model uses a sequential design process?

C testing D staging

Which of the following are application development stages? (Choose all that apply.)

A. Disabling unnecessary ports and services B Employing least functionality C Password auditing

Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.)

Barricade

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

SD

Which of the following is a popular type of removable data storage used on mobile devices?

code emulation

Which of the following is an AV heuristic monitoring technique?

Supply chains take advantage of the trusted "chain of trust" concept.

Which of the following is not a reason why supply chain infections are considered especially dangerous?

Staging stage

Which stage is a "quality assurance" test that verifies the code functions as intended?

Keyed entry lock

Which type of residential lock is most often used for keeping out intruders?


Ensembles d'études connexes

Chapter 2: The Texas State Constitution and the American Federal System

View Set

SmartBook--Chapter 12: Six Sigma Quality

View Set

VETT 117 Unit 2 Hematology Weeks 8&9

View Set

Pediatric Success Questions RESPIRATORY

View Set

LAST FOOKING MARKETING TESTTTT!:)))

View Set

3. Physics Practice Questions Chapter 7

View Set