1400 Flashcards
(100 cards)
Which of the following cannot be used along with fencing as a security perimeter? A. vapor barrier B. rotating spikes C. roller barrier D. anti-climb pain
A. vapor barrier
A __________ can be used to secure a mobile device. A. cable lock B. mobile chain C. security tab D. mobile connector
A. cable lock
Which of the following is not used to secure a desktop computer? A. data encryption B. screen locking C. remote wipe/sanitation D. strong passwords
C. remote wipe/sanitation
Which is the first step in securing an operating system? A. implement patch management B. configure operation system security and settings C. perform host software baselining D. develop the security policy
D. develop the security policy
A typical configuration baseline would include each of the following except __________. A. changing any default settings that are insecure B. eliminating any unnecessary software C. enabling operating system security features D. performing a security risk assessment
D. performing a security risk assessment
Which of the following is NOT a Microsoft Windows setting that can be configured through a security template? A. account policies B. user rights C. keyboard mapping D. system services
C. keyboard mapping
__________ allows for a single configuration to be set and then deployed to many or all users. A. group policy B. active directory C. snap-in replication (SIR) D. command configuration
A. group policy
A __________ addresses a specific customer situation and often may not be distributed outside that customer’s organization. A. rollup B. service pack C. patch D. hotfix
D. hotfix
Which of the following is NOT an advantage to an automated patch update service? A. Administrators can approve or decline updates for client systems - force updates to install by a specific date - and obtain reports on what updates each computer needs B. Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth and time because each computer does not have to connect to an external server C. users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service. D. Specific types of updates that the organization does not test - such as hotfixes - can be automatically installed whenever they become available.
C. users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service.
Each of the following is a type of matching used by anti-virus software except __________. A. string scanning B. wildcard scanning C. match scanning D. mismatch scanning
C. match scanning
How does heuristic detection detect a virus? A. a virtualized environment is created and the code is executed in it B. A string of bytes from the virus is compared against the suspected file C. The bytes from the virus are placed in different “piles” and then used to create a profile D. The virus signature file is placed in a suspended chamber before streaming to the CPU
A. a virtualized environment is created and the code is executed in it
A cross-site request forgery (XSRF) __________. A. is used to inherit the identity and privileges of the victim B. is identical to cross-site scripting (XSS) C. cannot be blocked D. can only be used with a Web-based e-mail client
A. is used to inherit the identity and privileges of the victim
Which of the following is a list of approved e-mail senders? A. whitelist B. blacklist C. greylist D. greenlist
A. whitelist
A(n) __________ can provide details regarding requests for specific files on a system. A. audit log B. access log C. report log D. file log
B. access log
Errors that occur while an application is running are called __________. A. exceptions B. faults C. liabilities D. conventions
A. exceptions
Which is the preferred means of trapping user input for errors? A. Input validation B. On-trap input C. escaping D. Fuzz testing
C. escaping
Each of the following is true about data loss prevents (DLP) except __________. A. it can only protect data in use B. it can scan data on a DVD C. it can read inside compressed files D. a policy violation can generate a report or block the data
A. it can only protect data in use
Network hardware that provides multiple security functions.
All-In-One Network Security Appliance
A monitoring technique used by an IDS that creates a baseline of normal activities and compares actions against the baseline. Whenever a significant deviation from this baseline occurs - an alarm is raised.
Anomaly-Based Monitoring
A monitoring technique used by an IDS that uses the normal processes and actions as the standard and compares actions against it.
Behavior-Based Monitoring
A separate network that rests outside the secure network perimeter; untrusted outside users can access the DMZ but cannot enter the secure network.
Demilitarized Zone (DMZ)
A monitoring technique used by an IDS that uses an algorithm to determine if a threat exists.
Heuristic Monitoring
A software-based application that runs on a local host computer that can detect an attack as it occurs.
Host Intrusion Detection System (HIDS)
A device designed to be active security; it can detect an attack as it occurs.
Intrusion Detection System (IDS)