Chapter 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

which of these is not a state of data that DLP examines? data-in-use data-in process data-in-transit data-at-rest

data-in -process

A lock that extends a solid metal bar into the door frame for extra security is the __________________________

deadbolt lock

what is the first step in securing an operating system?

develop the security policy

---------------allows for a single configuration to be set and then deployed to many or all users.

group policy

a _________________________addresses a specific customer situation and often may not be distributed outside that customers orginization

hotfix

What type of controls are the processes for developing and ensuring that policies and procedures are carried our?

Administrative Conrols

Which of the following is not designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow? barricade fencing roller barrier type v controls

barricade

a _________________________can be used to secure a mobile device.

cable lock

how does heuristic detection detect a virus?

A virtualized environment is created and the code is executed in it.

Which statement about data loss prevention (DLP) is not true? It can only protect data while it is on the user's personal computer. it can scan data on a DVD it can read inside compressed files a policy violation can generate a report or block the data

It can only protect data while it is on the user's personal computer.

Which of the following is not an activity phase control? A.Compensating control B. detective control C. resource Control D. deterrent control

Resource Control

what is not an advantage to an automated patch update service?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Which statement about a mantrap is true? Is illegal in the US it monitors and controls two interlocking doors to a room. has a special key lock it requires a cipher lock

it monitors and controls two interlocking doors to a room.

The residential lock most often used for keeping out intruders is the ___________________________

key entry lock

which of the following is not a microsoft windows setting that can be configured through a security template? account policies user rights keyboard mapping system services

keyboard mapping

Which of the following is not a motion detection method? radio frequency moisture magnetism infarred

moisture

a typical configuration baseline would include the following except_________________________ changing any default settings that are insecure eliminating any unnecessary software enabling operating system security features performing a security risk assessment

performing a security risk assessment

which of the following is not a chracteristic of an alarmed carrier PDS? periodic visual inspection continuous monitoring carrier can be hidden below a floor eliminates the need to seal connections

periodic visual inspection

Which of the following cannot be used along with fencing as a security perimeter? vapor barrier rotating spikes roller barrier anti-climb paint

vapor barrier

which of these is a list of approved email senders? blacklist whitelist greylist greenlist

whitelist


संबंधित स्टडी सेट्स

Micro Exam 3 Practice Exam Questions

View Set

Environmental Science Renewable energy, etc

View Set

Marketing Chapter 6: Segmenting Consumer Markets/Business Markets, Market Targeting Strategy, The Positioning Process

View Set