Filters
Question type

Study Flashcards

A compiled code test is used to ensure that the projected application meets all specifications at that point

A) True
B) False

Correct Answer

verifed

verified

Anti-virus products typically utilize what type of virus scanning analysis?


A) Static analysis
B) Wildcard scanning analysis
C) Heuristic detection analysis
D) String scanning analysis

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a multi-functional device (MFD)?

Correct Answer

verifed

verified

A multi-functional d...

View Answer

What type of update does not allow a user to refuse or delay security updates?


A) preventative
B) forced
C) mandatory
D) security

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What security standard was introduced in conjunction with UEFI?


A) Unified Boot
B) BIOS
C) Secure Boot
D) Firmware Interface

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Explain the security advantages of "code signing" and "stored procedure"?

Correct Answer

verifed

verified

Code signing Confirms the soft...

View Answer

What publicly released software security update is intended to repair a vulnerability?


A) update
B) service pack
C) patch
D) renewal

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

C

What is a bollard?

Correct Answer

verifed

verified

A bollard is a short but sturd...

View Answer

When securing a laptop,it can be placed in an office or a desk drawer.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a popular type of removable data storage used on mobile devices?


A) SSD
B) SD
C) HDD
D) USB

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The BIOS was software that was integrated into the computer's motherboard.

A) True
B) False

Correct Answer

verifed

verified

Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply. )


A) Disabling unnecessary ports and services
B) Employing least functionality
C) Password auditing
D) Disabling default accounts/passwords

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

A,B,C

What type of storage is used on mobile devices?


A) volatile memory
B) ROM
C) RAM
D) flash memory

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Tightening security during the design and coding of an OS is called "locking."

A) True
B) False

Correct Answer

verifed

verified

Which OS hardening technique removes all unnecessary features that may compromise an operating system?


A) least privilege
B) OS priority
C) kernel pruning
D) reduce capabilities

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What software methodology includes security automation?


A) DevOps
B) Secure DevOps
C) Agile
D) Secure Agile

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Static program analyzers are tools that examine the software without actually executing the program;instead,the source code is reviewed and analyzed.

A) True
B) False

Correct Answer

verifed

verified

What is a supply chain and why is it critical to understand that it needs to be secured?

Correct Answer

verifed

verified

A supply chain is a network that moves a...

View Answer

What type of video surveillance is typically used by banks,casinos,airports,and military installations,and commonly employs guards who actively monitor the surveillance?


A) CCTV
B) ICTV
C) IPTV
D) ITV

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A

An access log is a record or list of individuals who have permission to enter a secure area,along with the time they entered and the time they left the area.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer