ch 9 Flashcards

1
Q

BIOS

A

Basic input/output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UEFI

A

unified extensible firmware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what was made to combat BIOS attacks

A

(UEFI) unified extensible firmware interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the secure boot process

A

when using UEFI and secure boot, a computer checks the digital signature of each piece of boot software. if signatures are deem valid the computer boots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what happens if the computer does not deem the boot valid

A

the computer doesn’t start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(TEMPEST)

A

telecommunications electronics material protected from emanating spurious transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is TEMPEST

A

intended to prevent attackers from picking up electromagnetic fields from government buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens during a supply chain infection

A

steps in the supply chain has opened the door for malware to be injected into products during their manufacturing or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what to for OS security configuration

A

Disabling unnecessary ports and services,
disabling defaults accounts/ passwords
employing least functionality
application white listing and black listing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a software security update to repair vulnerabilities

A

security patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what includes enhancements to the software to provide new or expanded functionality, does not address security vulnerability

A

feature update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what accumulates security updates and additional features

A

service patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what manages patches locally rather than rely on the vendor’s online update service

A

automated patch update service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

updates that are applied no matter what

A

forced updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

software that examines a computer for infections, scans new documents that might contain viruses

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the weakness of antivirus

A

vendor must continually search for new viruses, update and distribute signature files to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a newer approach to (AV) Antivirus that has heuristic monitoring

A

dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

one AV heuristic monitoring technique, questionable code is executed in virtual environment to determine if it is a virus.

A

code emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

monitors emails for span and other unwanted content

A

antispam- mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

define black listing

A

nonapproved senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

define whitelisting

A

approved senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what devides email messages into two piles spam and non spam

A

bayeasian filtering

23
Q

what helps prevent computers from becoming infected by different types of spyware

A

antispyware

24
Q

small window appearing over website usually created by advertisers

A

pop-up

25
Q

s separate program as part of anti-spyware package

A

pop-up blockers

26
Q

tightening security during the design and coding of the OS

A

OS Hardening

27
Q

an OS that has been designed through OS hardening

A

trusted OS

28
Q

Removing all unnecessary features that may compromise an OS

A

kernel pruning

29
Q

(SDIO)

A

Secure digital input output

30
Q

a storage cad with integrated wireless transmission capabilities

A

SDIO Secure digital input output

31
Q

An SDIO device used in devices like digital cameras

A

WIFI enabled micro SD card

32
Q

uses internal storage and external SD cards

A

Digital cameras

33
Q

(MFD)

A

Multifunctional devices

34
Q

combines the functions of a printer, copier, scanner, and fax machine

A

MFD Multifunctional devices

35
Q

(DLP)

A

Data loss prevention

36
Q

whats the alternative name for displays

A

often considered “passive” peripherals

37
Q

what is a bollard

A

vertical post, preventing a car from ramming into the building

38
Q

are security guards considered active security elements ?

A

yes

39
Q

(PDS)

A

Protection Distribution system

40
Q

a system of cable conduits used to protect classified information that is being transmitted between two secure areas

A

(PDS) Protected Distribution system

41
Q

Conduit contructed of special electrical metallic tubing

A

hardened carrier PDS

42
Q

specialized optical fibers in the conduit that sense acoustic vibrations that occur when an intruder attempts to gain access

A

alarmed carrier PDS

43
Q

the physical security protecting the hardware of the host system

A

computer hardware system

44
Q

what are the aspects of application security

A

application development security
secure coding techniques
code testing

45
Q

what are the application development stages

A

development
testing
staging
production

46
Q

what are the application development life cycles

A

waterfall model

agile model

47
Q

what does the secure devops methodology include

A
security automation 
continuous integration 
immutable systems 
infrastructure as code
base lining
48
Q

what is provisioning

A

the enterprise wide configuration, development, and management of multiple types of IT system resources

49
Q

what is deprovisioning

A

in application development is removing a resource that is no longer needed.

50
Q

test is used to ensure that the projected application meets all specifications at that point

A

model verification

51
Q

searches for errors that could prevent the application from properly compiling from source code to application code

A

compiled code testing

52
Q

looks for errors after the program has compiled correctly and is running

A

runtime code testing

53
Q

which is a testing environments that isolates the untested code from the live production environment

A

sandbox

54
Q

tools that examine software without executing the program

A

static program analyzers