Security Chapter 4

7 September 2022
4.7 (114 reviews)
34 test answers

Unlock all answers in this set

Unlock answers (30)
question
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
answer
physical token
question
​What type of filtering utilizes a an analysis of the content of spam messages in comparison to neutral / non-spam messages in order to make intelligent decisions as to what should be considered spam?
answer
Bayesian filtering
question
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensure that it is protected:
answer
Data Loss Prevention
question
Anti-virus products typically utilize what type of virus scanning analysis?​
answer
​Static analysis
question
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
answer
CCTV
question
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
answer
Using a mantrap
question
A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
answer
Embedded system
question
What type of device, sometimes called a packet filter, is designed to prevent malicious network packets from entering or leaving computers or networks?
answer
Firewall
question
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
answer
Baseline
question
Which of the following is not one of the types of settings that would be included in a Microsoft Windows security template?
answer
Resolution settings
question
DLP agent sensors are unable to read inside compressed files and binary files.​
answer
False
question
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications, and monitoring logs.
answer
True
question
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
answer
roller barrier
question
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
answer
service pack
question
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
answer
false
question
Most DLP systems make use of what method of security analysis below?
answer
Content inspection
question
What is the best way to prevent data input by a user from having potentially malicious effects on software?​
answer
​Escaping user responses
question
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. What is the name for this technique?
answer
heuristic detection
question
Keyed entry locks are much more difficult to defeat than deadbolt locks.
answer
false
question
Cipher locks are sometimes combined with what type of sensor, which uses infrared beams that are aimed across a doorway?
answer
Tailgate sensors
question
Subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective..
answer
activity phase controls
question
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area
answer
access list
question
Spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam..
answer
bayesian filtering
question
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
answer
fuzz testing
question
An attack that uses the user's web browser settings to impersonate the user
answer
XSRF - cross-site request forgery
question
An operating system for Google Android smartphones and other devices.
answer
android
question
A nonrelational database that is better tuned for accessing large data sets.
answer
noSQL
question
Large-scale, industrial control systems.
answer
SCADA supervisory control and data acquisition
question
A structure designed to block the passage of traffic
answer
barricade
question
A mobile operating system for Apple iPhones.
answer
iOS
question
DLP agent sensors are installed on each host device, and monitor for actions such as printing, copying to a USB flash drive, and burning to a CD or DVD.
answer
true
question
What is the maximum effective range of a typical passive RFID tag?
answer
19
question
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
answer
Anti-climb
question
Most portable devices, and some computer monitors, have a special steel bracket security slot built into the case, which can be used in conjunction with a
answer
cable lock