Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Choose the best answers 1. What security standard was introduced in conjunction with UEFI? a. Unified Boot b. bIOS c. Secure Boot d. Firmware Interface

Choose the best answers

1. What security standard was introduced in conjunction with UEFI?

a. Unified Boot

b. bIOS

c. Secure Boot

d. Firmware Interface

2. What U.S government classified standard is intended to prevent attackers from picking up electromagnetic fields government buildings?

a. RAIN

b. EMIF

c. TEMPEST

d. MaSec

3. What type of OS manages hardware and software on a client computer?

a. Network OS

d. Client OS

c. Workstation OS

d. Appliance OS

4. What type of OS in firmware is designed to manage a specific device like a video game console?

a. Network OS

b. Client OS

c. Workstation OS

d. Appliance OS

5. What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?

a. least functionality

b. Whitelisting

c. Blacklisting

d. Function limiting

6. In Microsoft windows, what type of templates are a collection of security configuration settings.

a. Security

b. User

c. System

d. Administrator

7. Anti-virus products typically utlize what type of virus scanning analysis?

a. Static analysis

b. Wildcard scanning analysis

c. Heuristic detection analysis

d. String scanning analysis

8. What is the name of cumulative package of all patches and hot-fixes as well as additional features up to a given point?

a. Feature pack

b. Roll-up

c. Service pack

d. Patch

9. Which AV approach uses a variety of techniques to spot the characteristics of virus instead of attempting to make matches?

a. Heuristic monitoring

b. Pattern detection

c. Hybrid monitoring

d. Combination detection

10. What publicly released software security update is intended to repair a vulnerability?

a. Update

b. Service pack

c. Patch

d. Renewal

11. What type of update does not allow a user to refuse or delay security updates?

a. Preventive

b. Forced

c. Mandatory

d. Security

12. Which of the following is an AV heuristic monitoring technique?

a. Code emulation

b. Environment scanning

c. Code monitoring

d. OS simulation

13. What monitors emails for spam and other unwanted content to prevent these messages from being delivered?

a. Mail gateway

b. Firewall

c. Router gateway

d. Code emulation

14. Which OS hardening technique removes all unnecessary features that may compromise an operating system?

a. Least privilege

b. OS priority

c. Kernel pruning

d. Reduce capabilities

15. What type of storage is used on mobile devices?

a. Volatile memory

b. ROM

c. RAM

d. Flash memory

16. Which of the following is a popular type of removable data storage used on mobile device?

a. SSD

b. SD

c. HDD

d. USB

17. Most portable devices and some compu0ter monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:

a. U-lock

b. Safe lock

c. Shield lock

d. Cable clock

18. A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technoloty?

a. Anti-climb

b. Spiked barrier

c. Roller barrier

d. Rotation spikes

19. How can an area be made secure from a non-secured area via two interlocking doors to a small room?

a. Using a lockout

b. Using a mantrap

c. Using a closet

d. Using a pit

20. A Wi-Fi enabled microSD card is an example of what type of device?

a. PCle

b. Mobile card

c. SDIO

d. Secure Digital

21. Which application development life-cycle model uses a sequential design process?

a. Agile

b. Linear

c. Waterfall

d. Serial

22. What software methodology includes security automation?

a. DevOps

b. Secure DevOps

c. Agile

d. Secure Agile

23. What specific process in application development removes a resource that is no longer needed?

a. Deprovisioning

b. Version control

c. Change management

d. Baselining

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Seven Databases In Seven Weeks A Guide To Modern Databases And The NoSQL Movement

Authors: Luc Perkins, Eric Redmond, Jim Wilson

2nd Edition

1680502530, 978-1680502534

More Books

Students also viewed these Databases questions

Question

What sort of reconciliations is required for segmented reporting?

Answered: 1 week ago

Question

Describe the Indian constitution and political system.

Answered: 1 week ago

Question

Explain in detail the developing and developed economy of India

Answered: 1 week ago

Question

Problem: Evaluate the integral: I = X 52+7 - 1)(x+2) dx

Answered: 1 week ago

Question

What is gravity?

Answered: 1 week ago

Question

What is the Big Bang Theory?

Answered: 1 week ago

Question

How do Data Types perform data validation?

Answered: 1 week ago

Question

How does Referential Integrity work?

Answered: 1 week ago