security Exam 4 Practice Test – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following are types of settings that would be included in a Microsoft Windows security template? (Choose three)
answer
Account policies, user rights, system services
question
A QR code can contain which of the following items directly? (Choose three.)
answer
URL, phone number, email address
question
The Apple _________ operating system, developed by Apple for their mobile devices, is a closed and proprietary architecture.
answer
iOS
question
_______ locks keep a record of when the door was opened and by which code.
answer
Cipher
question
_______ paint is a nontoxic petroleum gel-based paint that is thickly applied and does not harden; thereby, making any coated surface very difficult to climb.
answer
Anti-climb
question
Keyed entry locks are much more difficult to defeat than deadbolt locks.
answer
False
question
Securing the host involves protecting the physical device itself, securing the operating system software on the system, using security-based software applications and monitoring logs.
answer
True
question
DLP agent sensors are installed on each host device and monitor for actions such as printing, copying to a USB flash drive or burning to a CD or DVD.
answer
True
question
What is the name for a cumulative package of all patches and hotfixes as well as additional features up to a given point?
answer
Service pack
question
Instead of trying to make a match, modern AV techniques are beginning to use a type of detection that attempts to identify the characteristics of a virus. Which of the following is the name for this technique?
answer
heuristic detection
question
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What the name of this technology?
answer
roller barrier
question
What is the best way to prevent data input by a user from having potentially malicious effects on software?
answer
Escaping user responses
question
Which of the following management systems can help facilitate asset tracking?
answer
Mobile Device Management (MDM)
question
Which of the following can be enabled to prevent a mobile device from being used until a user enters the correct passcode such as a pin or password?
answer
Enable a lock screen
question
Most DLP systems make use of which of the following methods of security analysis?
answer
Content inspection
question
Select the tool below that consists of a system of security tools that is used to recognize and identify data that is critical to an organization and ensures that it is protected:
answer
Data Loss Prevention
question
What type of video surveillance is typically used by banks, casinos, airports and military installations and commonly employs guards who actively monitor the surveillance?
answer
CCTV
question
What is the maximum effective range of a typical passive RFID tag?
answer
19
question
Which of the following is a wearable technology?
answer
Google glass
question
What is the name for a standard or checklist against which systems can be evaluated and audited for their level of security (security posture)?
answer
baseline
question
A QR code can store website URLs, plain text, phone numbers, e-mail addresses or virtually an alphanumeric data up to 4296 characters.
answer
True
question
Which of the following are considered to be basic characteristics of mobile devices? (Choose three.)
answer
Small form factor Mobile operating system Data synchronization capabilities
question
Which of the following are features provided by a typical MDM? (Choose three.)
answer
Rapidly enroll new mobile devices Discover devices accessing enterprise systems Selectively erase corporate data while leaving personal data intact
question
The PC Card and CardBus devices are being replaced with which technology?
answer
ExpressCard
question
Which of the following mobile operating systems require all applications to be reviewed and approved before they can be made available on the public store front?
answer
iOS
question
A system such as a printer, smart TV, or HVAC controller typically uses an operating system on what is called a(n):
answer
Embedded system
question
Instead of using a key or entering a code to open a door, a user can use an object such as an ID badge to identify themselves in order to gain access to a secure area. Which of the following describes this type of object?
answer
physical token
question
What type of filtering utilizes an analysis of the content of spam messages in comparison to neutral/non-spam messages in order to make intelligent decisions as to what should be considered spam?
answer
Bayesian filtering
question
Which of the following describes a hand-held mobile device that was intended to replace paper systems and typically included an appointment calendar, an address book, a "to-do" list, a calculator and the ability to record limited notes?
answer
Personal digital assistant (PDA)
question
An ultrabook is an example of what type of a portable computer?
answer
Subnotebook
question
Mobile devices use _________ for storage, which is a nonvolatile solid state electronic storage that can be electrically erased and reused.
answer
flash memory
question
_______ security is the physical security that specifically involves protecting the hardware of the host system, particularly portable laptops, netbooks and tablet computers that can easily be stolen.
answer
Hardware
question
A _____________ is a document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure.
answer
security policy
question
Which PIN is considered to be the most commonly used PIN?
answer
1234
question
Cipher locks are sometimes combined with what type of sensor which uses infrared beams that are aimed across a doorway?
answer
Tailgate sensors
question
Most portable devices and some computer monitors have a special steel bracket security slot built into the case which can be used in conjunction with a:
answer
Cable lock
question
What type of device is designed to prevent malicious network packets from entering or leaving computers or networks (often referred to as a packet filter)?
answer
Firewall
question
What PC Card type is typically used for memory?
answer
Type I
question
How can an administrator manage applications on mobile devices using a technique called "app wrapping"?
answer
Mobile Application Management
question
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what type of technology?
answer
Anti-climb
question
What SD card family can be used to transmit pictures over a wireless network to a laptop hard drive or wireless printer?
answer
Secure Digital Input Output (SDIO)
question
Which of the following are options of the SD format card families? (Choose three.)
answer
Standard Capacity (SDSC) High Capacity (SDHC) Secure Digital Input Output (SDIO)
question
__________ are portable computing devices that are generally larger than smartphones, smaller than notebooks and focused on ease of use.
answer
Tablets
question
DLP agent sensors are unable to read inside compressed files and binary files.
answer
False
question
The CardBus is a 64-bit bus in the PC card form factor.
answer
False
question
The Google Android mobile operating system is a proprietary system for use on only approved devices.
answer
False
question
Which of the following ports can be found in a laptop?
answer
USB, eSATA, RJ-45
question
A(n) _____________ is a record or list of individuals who have permission to enter a secure area, the time they entered and the time they left the area.
answer
Access list
question
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
answer
Using a mantrap
question
A ____________ is a matrix or two-dimensional barcode first designed for the automotive industry in Japan.
answer
QR code
question
___________ uses a device's GPS to define geographical boundaries where an app can be used.
answer
Geo-fencing
question
Mobile devices with global positioning system (GPS) abilities typically make use of:
answer
Location services
question
Anti-virus products typically utilize what type of virus scanning analysis?
answer
Static analysis
question
Simply using a mobile device in a public area can be considered a risk.
answer
True
question
Which of the following is a type of computing device that uses a limited version of the Linux operating system and uses a web browser with an integrated medial player?
answer
web-based
question
Mobile devices such as laptops are stolen on average once every 20 seconds
answer
False
question
Mobile Device Management systems that allow users to store usernames and passwords within a device are said to be using:
answer
credential management
question
Combination padlocks consist of buttons that must be pushed in the proper sequence in order to be unlocked.
answer
False
question
Proximity readers utilize a special type of tag that can be affixed to the inside of an ID badge. What is the name for this type of tag?
answer
Radio Frequency Identification Tag (RFID)
question
What term is used to describe the operation of stockrooms where mobile devices are stored prior to their dispersal to employees?
answer
Inventory control
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New