Final - SEC-110
cellular telephony
A communications network in which the coverage area is divided into hexagon-shaped cells.
C. Jailbreaking
A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called? A. Rooting B. Sideloading C. Jailbreaking D. Ducking
deadbolt lock
A lock that extends a solid metal bar into the door frame for extra security is the _____.
ANT
A proprietary wireless network technology that is used primarily by sensors for communicating data.
C. Infrared
Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today? A. ANT B. Bluetooth C. Infrared D. NFC
bring your own device (BYOD)
Allows users to use their own personal mobile devices for business purposes.
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
Anti-climb
None
Apps are small and very useful software programs that range from essential to just silly. They are available from device manufacturers, OS providers, and third parties. Which of the app types listed can be side-loaded on an iOS device?
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
Bayesian filtering
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
CCTV
A. Type D
Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? A. Type D B. Mini C. Micro D. Standard
choose your own device (CYOD)
Employees choose from a limited selection of approved devices but the employee pays the upfront cost of the device while the business owns the contract.
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.)
Employing least functionality Disabling unnecessary ports and services Disabling default accounts/passwords
A compiled code test is used to ensure that the projected application meets all specifications at that point
False
The BIOS was software that was integrated into the computer's motherboard. T/F
False
The strongest starting point for the boot process for a computer is the software root of trust.
False
The testing stage is a "quality assurance" test to verify that the code functions as intended.
False
Tightening security during the design and coding of an OS is called "locking."
False
When securing a laptop, it can be placed in an office or a desk drawer.
False
What type of update does not allow a user to refuse or delay security updates?
Forced
A. reset to factory settings
Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device? A. reset to factory settings B. extend lockout period C. enable high security D. lock device
Using the security mechanisms on a standard Wi-Fi network.
How can an SDIO card be made secure?
The bytes of a virus are placed in different "piles" and then used to create a profile.
How does heuristic detection detect a virus?
On-boarding
In MDM terms, which choice would most quickly get a device enrolled on a network?
C. CYOD
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support? A. BYOD B. COPE C. CYOD D. Corporate-owned
D. push notification services
Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use? A. MCM B. COPE C. MAM D. push notification services
D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security? A. USB OTG uses strong security and the executive should have no concerns. B. Subnotebooks do not support USB OTG. C. An unsecured mobile device could infect other tethered mobile devices or the corporate network. D. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.
C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks.
Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates? A. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. B. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. C. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks. D. Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.
Which of the following is a popular type of removable data storage used on mobile devices?
SD
A Wi-Fi enabled microSD card is an example of what type of device?
SDIO
What security standard was introduced in conjunction with UEFI?
Secure Boot
What software methodology includes security automation?
Secure DevOps
Chain of Trust
Select the response that best identifies the method of using UEFI and Secure Boot to validate the first element of the boot process then validate each consecutive element before handing the hardware over to the operating system?
containerization
Separating storage into separate business and personal "containers."
Anti-virus products typically utilize what type of virus scanning analysis?
Static analysis
Supply Chain Infection
System or device infections can be introduced during the manufacture or storage of the items. How is this described?
What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings?
TEMPEST
application management
The tools and services responsible for distributing and controlling access to apps.
1234
This PIN is used by well over 10% of ATM users in a recent survey of banks limiting the codes to 4 digits.
content management
Tools used to support the creation and subsequent editing and modification of digital content by multiple employees.
An access log is a record or list of individuals who have permission to enter a secure area, along with the time they entered and the time they left the area.
True
An automated patch update service is used to manage patches within the enterprise instead of relying on the vendor's online updates.
True
In the production stage the application is released to be used in its actual setting.
True
One tool for change management is version control software that allows changes to be automatically recorded and if necessary "rolled back" to a previous version of the software.
True
Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed.
True
carrier unlocking
Uncoupling a phone from a specific wireless provider.
context-aware authentication
Using a contextual setting to validate a user.
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Using a mantrap
A. mobile device management (MDM)
What allows a device to be managed remotely? A. mobile device management (MDM) B. mobile application management (MAM) C. mobile resource management (MRM) D. mobile wrapper management (MWM)
Group Policy
What allows for a single configuration to be set and then deployed to many or all users?
Wrong passcode 3 times
What criteria has to be met for you to get a picture of the person that stole your tablet?
D. It separates personal data from corporate data.
What does containerization do? A. It splits operating system functions only on specific brands of mobile devices. B. It places all keys in a special vault. C. It slows down a mobile device to half speed. D. It separates personal data from corporate data.
B. geofencing
What enforces the location in which an app can function by tracking the location of the mobile device? A. location resource management B. geofencing C. GPS tagging D. Graphical Management Tracking (GMT)
B. geolocation
What is the process of identifying the geographical location of a mobile device? A. geotracking B. geolocation C. geoID D. geomonitoring
B. screen lock
What prevents a mobile device from being used until the user enters the correct passcode? A. swipe identifier (SW-ID) B. screen lock C. screen timeout D. touch swipe
Import Security Template
When securing a Windows OS in a corporate environment, which of the elements shown will quickly apply the desired security settings of a properly configured host to the target system?
Alarm will sound
When your tablet is missing, you realize that you last used it in class and had the speakers set to mute. Which result can you expect if you try to track it by playing a sound?
Waterfall model
Which model uses a sequential design process?
UEFI, and Secure Boot
Which of the choices were implemented to combat motherboard firmware infections caused by corrupted updates?
Cable lock
Which of the following can be used to secure a laptop or mobile device?
Automated Patch Update Service
Which of the following choices describes the process of testing updates and patches before distributing them to your organization in order to ensure stable operation?
Requires periodic visual inspections
Which of the following is NOT a characteristic of an alarmed carrier PDS?
Variable overflow
Which of the following is NOT a memory vulnerability?
Moisture
Which of the following is NOT a motion detection method?
Supply chains take advantage of the trusted "chain of trust" concept.
Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
Restricting patch management
Which of the following is NOT a typical OS security configuration?
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
Which of the following is NOT an advantage to an automated patch update service?
Barricade
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
Service pack
Which of the following is a cumulative package of all patches?
A. MMS
Which of the following technologies provides for pictures, video, or audio to be included in text messages? A. MMS B. QR C. SMS D. ANT
Dynamic analysis
Which of the following types of testing uses unexpected or invalid inputs?
D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.
Which of these is NOT a risk of connecting a mobile device to a public network? A. Public networks are beyond the control of the employee's organization. B. Replay attacks can occur on public networks. C. Public networks may be susceptible to man-in-the-middle attacks. D. Public networks are faster than local networks and can spread malware more quickly to mobile devices.
B. last known good configuration
Which of these is NOT a security feature for locating a lost or stolen mobile device? A. remote lockout B. last known good configuration C. alarm D. thief picture
Whitelist
Which of these is a list of approved email senders?
A. password
Which of these is considered the strongest type of passcode to use on a mobile device? A. password B. PIN C. fingerprint swipe D. draw connecting dots pattern
Staging stage
Which stage is a "quality assurance" test that verifies the code functions as intended?
It monitors and controls two interlocking doors to a room.
Which statement about a mantrap is true?
A. physical keyboard
Which technology is NOT a core feature of a mobile device? A. physical keyboard B. small form factor C. local non-removable data storage D. data synchronization capabilities
A. MAM
Which tool manages the distribution and control of apps? A. MAM B. MDM C. MCM D. MFM
B. RTOS
Which type of OS is typically found on an embedded system? A. SoC B. RTOS C. OTG D. COPE
Network OS
Which type of operating system runs on a firewall, router, or switch?
Keyed entry lock
Which type of residential lock is most often used for keeping out intruders?
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus?
antivirus
What type of OS in firmware is designed to manage a specific device like a video game console?
appliance OS
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
cable lock
Which of the following is an AV heuristic monitoring technique?
code emulation
What specific process in application development removes a resource that is no longer needed?
deprovisioning
What type of storage is used on mobile devices?
flash memory
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches?
heuristic monitoring
Which OS hardening technique removes all unnecessary features that may compromise an operating system?
kernel pruning
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?
least functionality
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
mail gateway
What publicly released software security update is intended to repair a vulnerability?
patch
What type of tools are involved in effective patch management? (Choose all that apply.)
patch distribution patch reception
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
roller barrier
In Microsoft Windows, what type of templates are a collection of security configuration settings?
security
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
service pack
Which of the following are application development stages? (Choose all that apply.)
testing staging
Which application development life-cycle model uses a sequential design process?
waterfall
What type of OS manages hardware and software on a client computer?
workstation OS