Unit 9 (Chapter 10)

11 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
Moisture
answer
Which of the following is NOT a motion detection method? β€’ Magnetism β€’ Infrared β€’ Moisture β€’ Radio frequency
question
The bytes of a virus are placed in different "piles" and then used to create a profile.
answer
How does heuristic detection detect a virus? β€’ A virtualized environment is created and the code is executed in it. β€’ A string of bytes from the virus is compared against the suspected file. β€’ The virus signature file is placed in a suspended chamber before streaming to the CPU. β€’ The bytes of a virus are placed in different "piles" and then used to create a profile.
question
Whitelist
answer
Which of these is a list of approved email senders? β€’ Bluelist β€’ Yellowlist β€’ Whitelist β€’ Blacklist
question
Service pack
answer
Which of the following is a cumulative package of all patches? β€’ Hotfix β€’ Service pack β€’ Patch β€’ Rollup
question
Barricade
answer
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow? β€’ Type V controls β€’ Barricade β€’ Fencing β€’ Roller barrier
question
Restricting patch management
answer
Which of the following is NOT a typical OS security configuration? β€’ Disabling default accounts/passwords β€’ Restricting patch management β€’ Disabling unnecessary ports and services β€’ Employing least functionality
question
Group Policy
answer
What allows for a single configuration to be set and then deployed to many or all users? β€’ Active Directory β€’ Command Configuration β€’ Snap-In Replication (SIR) β€’ Group Policy
question
Staging stage
answer
Which stage is a "quality assurance" test that verifies the code functions as intended? β€’ Production stage β€’ Staging stage β€’ Development stage β€’ Testing stage
question
Network OS
answer
Which type of operating system runs on a firewall, router, or switch? β€’ Resource OS β€’ Network OS β€’ Device OS β€’ Server OS
question
Variable overflow
answer
Which of the following is NOT a memory vulnerability? β€’ Variable overflow β€’ Pointer deference β€’ Buffer overflow β€’ DLL injection
question
Cable lock
answer
Which of the following can be used to secure a laptop or mobile device? β€’ Cable lock β€’ Mobile connector β€’ Security tab β€’ Mobile chain
question
deadbolt lock
answer
A lock that extends a solid metal bar into the door frame for extra security is the _____. β€’ full bar lock β€’ deadbolt lock β€’ deadman's lock β€’ triple bar lock
question
Supply chains take advantage of the trusted "chain of trust" concept
answer
Which of the following is NOT a reason why supply chain infections are considered especially dangerous? β€’ Supply chains take advantage of the trusted "chain of trust" concept. β€’ Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected. β€’ It is virtually impossible to closely monitor every step in the supply chain. β€’ If the malware is planted in the ROM firmware of the device this can make it 5 or sometimes even impossible to clean an infected device.
question
Waterfall model
answer
Which model uses a sequential design process? β€’ Agile model β€’ Secure model β€’ Waterfall model β€’ Rigid model
question
Dynamic analysis
answer
Which of the following types of testing uses unexpected or invalid inputs? β€’ Dynamic analysis β€’ Runtime testing β€’ Static analysis β€’ Stress testing
question
Requires periodic visual inspections
answer
Which of the following is NOT a characteristic of an alarmed carrier PDS? β€’ Carrier can be hidden above the ceiling β€’ Uses continuous monitoring β€’ Requires periodic visual inspections β€’ Eliminates the need to seal connections
question
It monitors and controls two interlocking doors to a room.
answer
Which statement about a mantrap is true? β€’ It requires the use of a cipher lock. β€’ It is a special keyed lock. β€’ It is illegal in the United States. β€’ It monitors and controls two interlocking doors to a room.
question
Using the security mechanisms on a standard Wi-Fi network.
answer
How can an SDIO card be made secure? β€’ Using the security mechanisms on a standard Wi-Fi network. β€’ Turning on patch updates to the SDIO card. β€’ SDIO cards are natively secure and no security settings are needed. β€’ Requiring a username before accessing the SDIO card.
question
Keyed entry lock
answer
Which type of residential lock is most often used for keeping out intruders? β€’ Privacy lock β€’ Encrypted key lock β€’ Keyed entry lock β€’ Passage lock
question
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
answer
Which of the following is NOT an advantage to an automated patch update service? β€’ Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs. β€’ Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server. β€’ Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available. β€’ Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.