Chapter 9 Flashcards
Combo: Quiz 9 plus Book End of Chapter Questions
Which of the following is NOT a reason why supply chain infections are considered especially dangerous?
a. If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device.
b. Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected.
c. It is virtually impossible to closely monitor every step in the supply chain.
d. Supply chains take advantage of the trusted “chain of trust” concept.
d. Supply chains take advantage of the trusted “chain of trust” concept.
Which type of operating system runs on a firewall, router, or switch?
a. Server OS
b. Network OS
c. Device OS
d. Resource OS
b. Network OS
Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?
a. Barricade
b. Fencing
c. Roller barrier
d. Type V controls
a. Barricade
Which of the following is NOT a motion detection method?
a. Magnetism
b. Radio frequency
c. Moisture
d. Infrared
c. Moisture
Which type of residential lock is most often used for keeping out intruders?
a. Encrypted key lock
b. Keyed entry lock
c. Privacy lock
d. Passage lock
b. Keyed entry lock
A lock that extends a solid metal bar into the door frame for extra security is the _____.
a. triple bar lock
b. deadman’s lock
c. full bar lock
d. deadbolt lock
b. deadman’s lock
Which statement about a mantrap is true?
a. It is illegal in the United States.
b. It monitors and controls two interlocking doors to a room.
c. It is a special keyed lock.
d. It requires the use of a cipher lock.
b. It monitors and controls two interlocking doors to a room.
Which of the following is NOT a typical OS security configuration?
a. Employing least functionality
b. Restricting patch management
c. Disabling default accounts/passwords
d. Disabling unnecessary ports and services
b. Restricting patch management
Which of the following can be used to secure a laptop or mobile device?
a. Mobile connector
b. Cable lock
c. Mobile chain
d. Security tab
b. Cable lock
Which of the following is NOT a characteristic of an alarmed carrier PDS?
a. Requires periodic visual inspections
b. Uses continuous monitoring
c. Carrier can be hidden above the ceiling
d. Eliminates the need to seal connections
a. Requires periodic visual inspections
Which of the following is NOT a memory vulnerability?
a. DLL injection
b. Pointer deference
c. Buffer overflow
d. Variable overflow
d. Variable overflow
Which stage is a “quality assurance” test that verifies the code functions as intended?
a. Production stage
b. Testing stage
c. Staging stage
d. Development stage
c. Staging stage
Which model uses a sequential design process?
a. Waterfall model
b. Rigid model
c. Agile model
d. Secure model
a. Waterfall model
What allows for a single configuration to be set and then deployed to many or all users?
a. Snap-In Replication (SIR)
b. Active Directory
c. Group Policy
d. Command Configuration
c. Group Policy
Which of the following is a cumulative package of all patches?
a. Rollup
b. Service pack
c. Patch
d. Hotfix
b. Service pack