Security + Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile? Blacklist filtering Whitelist filtering Bayesian filtering Extension filtering

Bayesian filtering

Which of the following selections is not one of the features provided by a typical MDM? Rapidly deploy new mobile devices Discover devices accessing enterprise systems Track stolen devices Enforce encryption settings

Track stolen devices

A TOTP changes after a set period. True/False

True

A disaster recovery plan is developed for restoring the IT functions and services to their former state. True/False

True

Assessing risk should include testing of technology assets to identify any vulnerabilities. True/False

True

Authentication, authorization, and accounting are sometimes called AAA. True/False

True

Brute force attacks can be very slow because every character combination must be generated. True/False

True

In the production stage the application is released to be used in its actual setting. True/False

True

Infrared light is next to the visible light on the light spectrum. True/False

True

Least privilege in access control means that only the minimum amount of privileges necessary to perform a job or function should be allocated. True/False

True

A Wi-Fi enabled microSD card is an example of what type of device? PCIe mobile card SDIO Secure Digital

mobile card

Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability. intrusive passive non-intrusive active

non-intrusive

The action that is taken by a subject over an object is called a(n): control access operation authorization

operation

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a: biometric detail password token challenge

password

If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing? spinning pivot secondary exploitation persistence

pivot

If a user uses the operating system's "delete" command to erase data, what type of data removal procedure was used? degaussing wiping data sanitation purging

purging

What type of risk calculation uses an "educated guess" based on observation? quantitative risk calculation environmental risk calculation qualitative risk calculation observational risk calculation

qualitative risk calculation

The use of what item below involves the creation of a large pre-generated data set of candidate digests? word list rainbow tables cascade tables randomized character list

rainbow tables

What term can be described as a function of threats, consequences of those threats, and the resulting vulnerabilities? threat mitigation risk management

risk

Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server? system account privileged account shared account service account

service account

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face? physical biometrics cognitive biometrics standard biometrics reactive biometrics

standard biometrics

Which threat category affects the long-term goals of the organization? operational compliance strategic managerial

strategic

A snapshot of the current state of a computer that contains all current settings and data is known as what option below: system standard system image system baseline system view

system image

The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur? threat modeling threat mitigation threat profiling risk modeling

threat modeling

What is another term used for a security weakness? risk vulnerability opportunity threat

vulnerability

Which scan examines the current security, using a passive method? application scan vulnerability scan system scan threat scan

vulnerability scan

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a: spare site hot site warm site cold site

warm site

Which application development life-cycle model uses a sequential design process? agile linear waterfall serial

waterfall

Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.) -Disabling unnecessary ports and services -Employing least functionality -Password auditing -Disabling default accounts/passwords

-Disabling unnecessary ports and services -Employing least functionality -Password auditing

What is an entry in an ACL known as? ACE SQL flag DACL

ACE

Which enterprise deployment model requires employees to choose from a selection of company owned and approved devices? BYOD COPE VDI CYOD

COPE

Which access control model is considered to be the least restrictive? Rule Based Access Control Mandatory Access Control Discretionary Access Control Role Based Access Control

Discretionary Access Control

What framework is used for transporting authentication protocols instead of the authentication protocol itself? SAML CHAP MS-CHAP EAP

EAP

A legal stop order is a notification sent from the legal team to employees instructing them not to delete electronically stored information or paper documents that may be relevant to the incident. True/False

False

A retina scanner has become the most common type of standard biometrics. True/False

False

A subject's privilege over an object should follow the principle of least privilege. True/False

False

ACLs provide file system security for protecting files managed by the user. True/False

False

Distributive allocation refers to "eliminating" the risk. True/False

False

The BIOS was software that was integrated into the computer's motherboard. True/False

False

The greatest asset of a mobile device-its security. True/False

False

What type of technology can add geographical identification data to media such as digital photos taken on a mobile device? GPS locating GeoData tagging GPS marking GPS tagging

GPS tagging

Select the option that represents a wearable technology. Android iPhone Google Chromebook Google Glass

Google Glass

What type of planning do many enterprises participate in that addresses a future event or circumstance that might possibly occur but cannot be predicted with any certainty? contingency system evaluation IT disaster planning IT contingency planning disaster recovery scenario

IT contingency planning

What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties so that they can work together? MOU NDA BPA ISA

MOU

How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?" Mobile Application Management Extended Application Management Remote Application Management Cloud Application Management

Mobile Application Management

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access? OTG COPE OTA VDI

OTG

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs? ICMP RADIUS FTP Telnet

RADIUS

Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance? ESD MTBF RAID RPO

RAID

Which access control model can dynamically assign roles to subjects based on a set of defined rules? Mandatory Access Control Discretionary Access Control Role Based Access Control Rule Based Access Control

Rule Based Access Control

Realistically, risks can never be entirely eliminated. True/False

True

Static program analyzers are tools that examine the software without actually executing the program; instead, the source code is reviewed and analyzed. True/False

True

TCP/IP uses a numeric value as an identifier to the applications and services on these systems. True/False

True

The transmission time needed to repeat a signal from one earth station to another is approximately 250 milliseconds. True/False

True

What security goal do the following common controls address: Redundancy, fault tolerance, and patching.? safety integrity availability confidentiality

availability

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as: business management planning enterprise disaster planning business continuity planning disaster planning

business continuity planning

When does a company need to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed? business impact analysis business alert assessment business productivity analysis business risk analysis

business impact analysis

Which of the following is an AV heuristic monitoring technique? code emulation environment scanning code monitoring OS simulation

code emulation

Which type of biometrics is based on the perception, thought process, and understanding of the user? cognitive biometrics reactive biometrics standard biometrics physical biometrics

cognitive biometrics

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of: penetration testing vulnerability testing computer forensics risk management

computer forensics

Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees? extended management content management remote management application management

content management

What process addresses how long data must be kept and how it is to be secured? legal retention data methodology data retention legal and compliance

data retention

What control is designed to identify any threat that has reached the system? preventive control compensating control detective control deterrent control

detective control

Which term below describes the time it takes for a key to be pressed and then released? react time lead time sync time dwell time

dwell time

Which of the following is caused by a short-duration burst of energy by the source? Faraday interference electromagnetic interference electromagnetic pulse electrostatic discharge

electromagnetic interference

What type of storage is used on mobile devices? volatile memory ROM RAM flash memory

flash memory

What specific type of authentication can be based on where the user is located? GPS somewhere locating geocache geolocation

geolocation

Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement? role-based access control computer-based access control system access control group-based access control

group-based access control

A collection of suggestions that should be implemented is referred to as a: security policy baseline guideline security procedure

guideline

Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches? heuristic monitoring pattern detection hybrid monitoring combination detection

heuristic monitoring

What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization? incident reporting incident management incident handling incident planning

incident management


संबंधित स्टडी सेट्स

Possible Multiple Choice Questions

View Set

Basic python and console interaction

View Set

Chapter 16: Nursing Management During the Postpartum Period

View Set

VETT 114: Pharma and Med Thera week 6 pt. 1

View Set

Duties and Disclosures to Third Parties

View Set

Representing Data Sets with Histograms(Pre-Test and Quiz) 100%

View Set

ACCT 245 2022 FALL QUARTER EXAM PREP

View Set