Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Which of the following is hardware used to automatically encrypt a computers drive? A. UEFI B.

1.  Which of the following is hardware used to automatically encrypt a computer’s drive?
    A.     UEFI
    B.     FDE
    C.     SED
    D.     BIOS

2.  What is a term for the process of securing a system by reducing its surface of vulnerability?
    A.     endpoint detection and response (EDR)
    B.     sandboxing
    C.     Hardening
    D.     fuzzing

3.  This checks the programming code as it is running.
    A.     Dynamic code analysis
    B.     Static code analysis
    C.     Application hardening
    D.     Manual code review

4.  Which of the following is software used to fully encrypt a computer’s drive?
    A.     FDE
    B.     UEFI
    C.     BIOS
    D.     SED

5.  Your operating system is rated EAL4 (Evaluation Assurance Level 4) by the Common Criteria. You most likely have a _____.
    A.     real-time operating system (RTOS)
    B.     data breach
    C.     virus
    D.     trusted operating system

6.  What is an example of an endpoint device?
    A.     Server
    B.     Switch
    C.     Firewall
    D.     Router

7.  What do we call the process of starting a computer?
    A.     Hash
    B.     Endpoint protection
    C.     Boot
    D.     Hardware root of trust

8.  This is performed by an automated tool that looks for coding mistakes, which is similar to a spell checker. This checks the programming code without running it.
    A.     Dynamic code analysis
    B.     Fuzzing
    C.     Static code analysis
    D.     Manual code review

9.  _____ is a way for an operating system to prove that it has integrity, after a secure boot.
    A.     boot attestation
    B.     Trusted Platform Module (TPM)
    C.     trusted operating system
    D.     hardware root of trust

10.  What function prevents malware infections at the BIOS/UEFI level and at the operating system level?
    A.     Multi-factor authentication
    B.     AES encryption
    C.     Secure boot
    D.     IPSec

Step by Step Solution

3.37 Rating (163 Votes )

There are 3 Steps involved in it

Step: 1

import javatextDecimalForm... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2015

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven Gill

33rd Edition

9781305177772, 128543952X, 1305177770, 978-1285439525

More Books

Students also viewed these Programming questions