Endpoint and Application Development Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What type of analysis is heuristic monitoring based on ? a . Dynamic analysis b . Input analysis c . Static analysis d . Code analysis

a . Dynamic analysis

Which of the following tries to detect and stop an attack ? a . HIPS b . HIDS c . RDE d . SOMA

a . HIPS

Which boot security mode sends information on the boot process to a remote server ? a . Measured Boot b . UEFI Native Mode c . Trusted Boot d . Secure Boot

a . Measured Boot

Which of the following is NOT a limitation of a threat map ? a . They can be difficult to visualize . b . Many maps claim that they show data in real time , but most are simply a playback of previous attacks . c . Because threat maps show anonymized data it is impossible know the identity of the attackers or the victims . d . Threat actors usually mask their real locations so what is displayed on a threat map is incorrect .

a . They can be difficult to visualize

Which of the following is FALSE about a quarantine process ? a . It is most often used with email attachments . b . It holds a suspicious application until the user gives approval . c . It can send a URL to the document that is on a restricted computer . d . It can send a sanitized version of the attachment .

b . It holds a suspicious application until the user gives approval .

What does Windows 10 Tamper Protection do ? a . Compresses and locks the registry b . Limits access to the registry c . Prevents any updates to the registry until the user approves the update . d . Creates a secure backup copy of the registry

b . Limits access to the registry

What are the two concerns about using public information sharing centers ? a . Security and privacy b . Privacy and speed c . Regulatory approval and sharing d . Cost and availability

b . Privacy and speed

Which model uses a sequential design process ? a . Secure model b . Waterfall model c . Rigid model d . Agile model

b . Waterfall model receiving information

What is the advantage of a secure cookie ? a . It only exists in RAM and is deleted once the web browser is closed . b . It cannot be stored on the local computer without the user's express permission . c . It is sent to the server over HTTPS . d . It is analyzed by AV before it is transmitted .

c . It is sent to the server over HTTPS .

What are the two limitations of private information sharing centers ? a . Bandwidth and CPU b . Government approval and cost c . Timing of reports and remote access d . Access to data and participation

d . Access to data and participation

Oskar has been receiving emails about critical threat intelligence information from a public information sharing center . His team leader has asked him to look into how the process can be automated so that the information can feed directly into their technology security . What technology will Oskar recommend ? a . Lightwire JSON Control b . Linefeed Access c . Bidirectional Security Protocol ( BSP ) d . Automated Indicator Sharing ( AIS )

d . Automated Indicator Sharing ( AIS )

An IOC occurs when what metric exceeds its normal bounds ? a . IRR b . EXR c . LRG d . KRI

d . KRI

Which stage conducts a test that will verify the code functions as intended ? a . Testing stage b . Development stage c . Staging stage d . Production stage

d . Production stage

Which of the following is not an improvement of UEFI over BIOS ? a . Networking functionality in UEFI b . Access larger hard drives c . Stronger boot security d . Support of USB 3.0 Which

d . Support of USB 3.0

Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information ? a . CISA b . FOIA c . PCII d . TLP

d . TLP

Luka has been asked by his supervisor to monitor the dark web for any IOCs concerning their organization . The next week , Luca reports back that he was unable to find anything due to how looking for information on the dark web is different from using the regular web . Which of the following is not different about looking for information on the dark web ? a . The naming structure is different on the dark web . b . Dark web merchants open and close their sites without warning . c . Dark web search engines are identical to regular search engines . d . It is necessary to use Tor or IP2 .

c . Dark web search engines are identical to regular search engines .

Which of the following is NOT an important OS security configuration ? a . Disabling unnecessary services b . Disabling default accounts c . Restricting patch management d . Employing least functionality

c . Restricting patch management

Which of the following is an application protocol for exchanging cyberthreat intelligence over HTTPS ? a . STIX b . TCP - Over - Secure ( TOP ) c . TAXII d . AIP - TAR

c . TAXII

Which of these is a list of preapproved applications ? a . Blacklist . b . Redlist . c . Whitelist d . Greenlist

c . Whitelist

Which of the following is NOT an advantage to an automated patch update service ? a . Specific types of updates that the organization does not test , such as hotfixes , can be automatically installed whenever they become available . b . Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server . c . Administrators can approve or decline updates for client systems , force updates to install by a specific date , and obtain reports on what updates each computer needs . d . Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service .

d . Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service .


Set pelajaran terkait

Quizzes for Ultrasound & Electrical Modalities

View Set

NURS 401 PrepU Ch. 24: Management of Patients With Chronic Pulmonary Disease

View Set

Lesson 5 - Transcription, Translation and DNA Repair

View Set

Management EAQ - Answers I missed

View Set

Chapter 4 IT INFRASTRUCTURE : HARDWARE AND SOFTWARE

View Set

Marketing 300 exam 1 study guide, HW ch. 1-6

View Set

Accounting - C8 - Reporting and Analyzing Receivables

View Set

Haydn Symphony No.94 in G Major "Surprise" Prescribed Work

View Set