CompTIA Security+ Cert Prep: 7 Endpoint Security Design and Implementation
What hardware technology may be embedded in a laptop computer to protect encrypted hard drives from removal?
TPM
Embedded systems often suffer from limited access to power and bandwidth.
TRUE
What is the name of the application control technology built-in to Microsoft Windows?
AppLocker
Which one of the following security controls is built in to Microsoft Windows?
Host firewall
Which one of the following shell environments is commonly associated with Windows systems?
PowerShell
Which one of the following statements about printers is incorrect?
Printers typically require no routine maintenance.
What type of system is used to gather information from remote sensors via telemetry?
SCADA
What communications technology provides the widest global coverage?
Satellite
Which one of the following is a file integrity monitoring tool?
Tripwire
What technology can you use as a compensating control when it's not possible to patch an embedded system?
Wrappers
What term best describes making a snapshot of a system or application at a point in time for later comparison?
baselining
Which one of the following security mechanisms prevents laptops from theft while they are in use?
cable lock
What file manipulation command is used to search the contents of a text file?
grep
What is the most important control to apply to smart devices?
network segmentation
What Linux file permissions group is used to describe the permissions assigned to any user of the system?
o
What component of a change management program includes final testing that the software functions properly?
release management
What type of malware prevention is most effective against known viruses?
signature detection
What DLP technique tags sensitive content and then watches for those tags in data leaving the organization?
watermarking
What command is used to apply operating system updates on some Linux distributions?
yum