Ch.4 Flashcards

1
Q

a paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area

A

access list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

subtypes of security controls, classified as deterrent, preventive, detective, compensation, or corrective

A

activity phase controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

process for developing and ensuring that policies and procedures are carried out, specifying actions that users may do, must do, or cannot do

A

administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an audible sound to warn a guard of an intruder

A

alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

software that helps prevent computers from becoming infected by different types of spyware

A

antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus

A

antivirus (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a structure designed to block the passage of traffic

A

barricade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

spam filtering software that analyzes every word in an email and determines how frequently a word occurs in order to determine if it is spam

A

Bayesian filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications

A

big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

permitting everything unless it appears on the list; a list of nonapproved senders

A

blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen

A

cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

having the client web browser perform all validations and error recovery procedures

A

client-side validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

video cameras and receivers used for surveillance in areas that require security monitoring

A

closed circuit television (CCTV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

control that provides an alternative to normal controls that for some reason cannot be used

A

compensating control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

control that is intended to mitigate or lessen the damage caused by an incident

A

corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an attack that uses the user’s web browser settings to impersonate the user

A

cross-site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data that is stored on electronic media

A

data at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

data that is in transit across a network, such as an email sent across the internet

A

data in-transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a stat of data in which actions upon it are being performed by “endpoint devices” such as printers

A

data in-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a door lock that extends a solid metal bar into the door frame for extra security

A

deadbolt lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

detective control

A

a control that is designed to identify any threat that has reached the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

deterrent control

A

a control that attempts to discourage security violations before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

embedded system

A

a computer system with a dedicated function within a larger electrical or mechanical system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

errors

A

faults in program that occur while the application is running. also called EXCEPTIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

exceptions

A

faults in program that occur while application is running. also called ERRORS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

fencing

A

securing a restricted area by erecting a barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

firewall

A

hardware or software that is designed to prevent malicious packets from entering or leaving computers. also called PACKET FILTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

fuzz testing (fuzzing)

A

a software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

guard

A

a human who is an active security element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

host-based application firewall

A

a firewall that runs as a program on local system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

hotfix

A

software that addresses a specific customer situation and often may not be distributed outside that customer’s organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

input validation

A

verifying a user’s input to an application

34
Q

lighting

A

lights that illuminate an area so that it can be viewed after dark

35
Q

locking cabinet

A

a ruggedized steel box with a lock

36
Q

mainframe

A

a very large computing system that has significant processing capabilities

37
Q

mantrap

A

a device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas

38
Q

motion detection

A

determining an object’s change in position in relation to its surroundings

39
Q

NoSQL

A

a nonrelational database that is better tuned for accessing large data sets

40
Q

NoSQL databases vs. SQL databases

A

an argument regarding which database technology is superior. also called SQL vs. NoSQL

41
Q

OS hardening

A

tightening security during the design and coding of the OS

42
Q

packet filter

A

hardware or softwAre that is designed to prevent malicious packets from entering or leaving computers. Also called FIREWALL

43
Q

patch

A

a general software security update intended to cover vulnerabilities that have been discovered

44
Q

popup blocker

A

either a program or a feature incorporated within a browser that stops popup advertisements from appearing

45
Q

preventive controls

A

a control that attempts to prevent the threat from coming in and reaching contact with the vulnerability

46
Q

protected distribution system (PDS)

A

a system of cable conduits that is used to protect classified information being transmitted between two secure areas

47
Q

a device that detects an emitted signal in order to identify the owner

A

proximity reader

48
Q

a ruggedized steel box with a lock

A

safe

49
Q

large-scale, industrial-control systems

Can be found in military installations, oil pipeline control systems, manufacturing environments, and nuclear power plants

A

SCADA (supervisory control and data acquisition)

50
Q

any device or process that is used to reduce risk

A

security control

51
Q

a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure

A

security policy

52
Q

having the server perform all validations and error recovery precedures

A

server-side validation

53
Q

software that is a cumulative package of all security updates plus additional features

A

service pack

54
Q

a written placard that explains a warning, such as notice that an area is restricted

A

sign

55
Q

a cell phone with an operating system that allows it to run third-party applications (apps)

A

smartphone

56
Q

an argument regarding which database technology is better. also called NoSQL DATABASES vs. SQL DATABASES

A

SQL vs NoSQL

57
Q

devices in which additional hardware cannot easily be added or attached

A

static environment

58
Q

security controls that are carried out or managed by devices

A

technical controls

59
Q

an operating system that has been designed through OS hardening

A

trusted OS

60
Q

monitoring activity that is captured by a video camera

A

video surveillance

61
Q

permitting nothing unless it appears on the list

A

whitelist

62
Q

a substitute for a regular function that is used in testing

A

wrapper function

63
Q

What type of controls are the processes for developing and ensuring that policies and procedures are carried out?

a. technical controls
b. active controls
c. administrative controls
d. policy controls

A

c

64
Q

Which of the following is NOT an activity phase control?

a. compensating control
b. detective control
c. resource control
d. deterrent control

A

c

65
Q

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is instead is intended to direct traffic flow?

a. barricade
b. fencing
c. roller barrier
d. type V controls

A

a

66
Q

Which of the following is NOT a motion detection method?

a. radio frequency
b. moisture
c. magnetism
d. infrared

A

b

67
Q

The residential lock most often used for keeping out intruders is the _______.

a. encrypted key lock
b. privacy lock
c. passage lock
d. keyed entry lock

A

d

68
Q

A lock that extends a solid metal bar into the door frame for extra security is the ______.

a. triple bar lock
b. deadman’s lock
c. full bar lock
d. deadbolt lock

A

d

69
Q

Which statement about a mantrap is true?

a. it is illegal in the U.S.
b. it monitors and controls two interlocking doors to a room
c. it is a special keyed lock
d. it requires the use of a cipher lock

A

b

70
Q

Which of the following cannot be used along with fencing as a security perimeter?

a. vapor barrier
b. rotating spikes
c. roller barrier
d. anticlimb paint

A

a

71
Q

A ______ can be used to secure a mobile device.

a. mobile connector
b. cable lock
c. mobile chain
d. security tab

A

b

72
Q

Which of the following is NOT a characteristic of an alarmed carrier PDS?

a. periodic visual inspections
b. continuous monitoring
c. carrier can be hidden below a floor
d. eliminates the need to seal connections

A

a

73
Q

Which is the first step in securing an operating system?

a. develop the security policy
b. implement patch management
c. configure operating system security and settings
d. perform host software baselining

A

a

74
Q

Atypical configuration baseline would include each of the following EXCEPT _______.

a. changing any default settings that are insecure
b. eliminating any unnecessary software
c. enabling operating system security features
d. performing a security risk assessment

A

d

75
Q

Which of the following is NOT a Microsoft Windows settings that can be configured through a security template?

a. account policies
b. user rights
c. keyboard mapping
d. system services

A

c

76
Q

______ allows for a single configuration to be set and then deployed to many or all users.

a. active directory
b. group policy
c. snap-in replication (SIR)
d. command configuration

A

b

77
Q

A ____ addresses a specific customer situation and often may not be distributed outside that customer’s organization.

a. rollup
b. service pack
c. patch
d. hotfix

A

d

78
Q

Which of the following is NOT an advantage to an automated patch update service?

a. Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs.
b. Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth and time because each computer does not have to connect to an external server
c. Users can disable or circumvent updates just as they can if their computer is configured to use the vendor’s online update service
d. Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available

A

c

79
Q

Which of these is NOT a state of data that DLP examines?

a. data in-use
b. data in -process
c. data in-transit
d. data at-rest

A

b

80
Q

How does heuristic detection detect a virus?

a. a virtualized environment is created and the code is executed in it
b. a string of bytes from the virus is compared against the suspected file
c. the bytes of a virus are placed in different “piles” and then used to create a profile
d. the virus signature file is placed in a suspended chamber before streaming to the CPU

A

a

81
Q

Which of these is a list of approved email senders?

a. blacklist
b. whitelist
c. greylist
d. greenlist

A

b

82
Q

Which statement about data loss prevention (DLP) is NOT true?

a. it can only protect data while it is on the user’s personal computer
b. it can scan data on a DVD
c. it can read inside compressed files
d. a policy violation can generate a report or block he data

A

a